Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13681: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thebaldfatguy BFG Tools – Extension Zipper

0
Medium
VulnerabilityCVE-2025-13681cvecve-2025-13681cwe-22
Published: Sat Feb 14 2026 (02/14/2026, 03:25:26 UTC)
Source: CVE Database V5
Vendor/Project: thebaldfatguy
Product: BFG Tools – Extension Zipper

Description

The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.7. This is due to insufficient input validation on the user-supplied `first_file` parameter in the `zip()` function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files and directories outside the intended `/wp-content/plugins/` directory, which can contain sensitive information such as wp-config.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 22:22:28 UTC

Technical Analysis

CVE-2025-13681 is a path traversal vulnerability classified under CWE-22 found in the BFG Tools – Extension Zipper plugin for WordPress, affecting all versions up to and including 1.0.7. The vulnerability stems from inadequate input validation on the 'first_file' parameter within the zip() function. This parameter is user-supplied and can be manipulated by an attacker with Administrator-level access to traverse directories outside the intended '/wp-content/plugins/' directory. By exploiting this flaw, an attacker can read arbitrary files on the server, including sensitive configuration files like wp-config.php, which may contain database credentials and other secrets. The vulnerability does not allow modification or deletion of files, nor does it enable remote code execution, but it compromises confidentiality. Exploitation requires authenticated access with high privileges, no user interaction is needed, and the attack can be performed remotely over the network. The CVSS v3.1 score is 4.9, reflecting a medium severity impact primarily on confidentiality with low complexity of attack due to insufficient access control on input parameters. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant for affected sites. The vulnerability highlights the importance of strict input validation and access control in WordPress plugins handling file operations.

Potential Impact

The primary impact of CVE-2025-13681 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers with Administrator privileges can access critical files such as wp-config.php, which may expose database credentials, API keys, and other confidential data. This can lead to further compromise of the WordPress site or connected systems if credentials are reused or leaked. Although the vulnerability does not allow code execution or file modification, the exposure of sensitive data can facilitate privilege escalation, lateral movement, or targeted attacks against the organization. For organizations relying on WordPress with this plugin installed, especially those hosting sensitive or regulated data, this vulnerability poses a significant confidentiality risk. The requirement for Administrator-level access limits the attack surface to insiders or compromised accounts but does not eliminate risk, as credential theft or phishing could enable exploitation. The lack of known exploits in the wild suggests limited current threat activity, but the vulnerability remains a concern for maintaining site integrity and confidentiality.

Mitigation Recommendations

To mitigate CVE-2025-13681, organizations should first check for updates or patches from the plugin vendor and apply them promptly once available. In the absence of an official patch, administrators should consider disabling or uninstalling the BFG Tools – Extension Zipper plugin to eliminate exposure. Restrict Administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of account compromise. Implement file system permissions that limit the web server's ability to read sensitive files outside the plugin directory, using techniques like chroot jails or hardened server configurations. Conduct regular audits of user accounts and plugin usage to detect unauthorized access or suspicious activity. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the 'first_file' parameter. Monitoring logs for unusual file access patterns can help identify exploitation attempts early. Finally, educate administrators on the risks of granting excessive privileges and the importance of plugin security hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T18:54:26.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901846c9e1ff5ad867f1be

Added to database: 2/14/2026, 6:37:58 AM

Last enriched: 2/21/2026, 10:22:28 PM

Last updated: 4/6/2026, 11:56:58 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses