CVE-2025-9693: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in khaledsaikat User Meta – User Profile Builder and User management plugin
The User Meta – User Profile Builder and User management plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the postInsertUserProcess function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-9693 is a high-severity vulnerability affecting the 'User Meta – User Profile Builder and User management' plugin for WordPress, developed by khaledsaikat. The vulnerability is classified as CWE-22, which corresponds to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. This issue exists in the postInsertUserProcess function in all plugin versions up to and including 3.1.2. The core problem is insufficient validation of file paths, allowing authenticated users with Subscriber-level privileges or higher to craft requests that delete arbitrary files on the server. The ability to delete critical files such as wp-config.php can lead to remote code execution (RCE), as attackers may remove or manipulate files that control WordPress configuration or security. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, requiring only low privileges and user interaction. Although no public exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. Exploitation involves leveraging the plugin's insufficient path sanitization to traverse directories and delete files outside the intended scope, potentially compromising the entire WordPress installation and underlying server. This vulnerability affects all versions of the plugin prior to the fix, and given the widespread use of WordPress and this plugin, the attack surface is considerable.
Potential Impact
For European organizations, the impact of CVE-2025-9693 can be severe. Many European businesses, governmental agencies, and non-profits rely on WordPress for their web presence, including e-commerce, content management, and internal portals. Exploitation could lead to unauthorized deletion of critical files, causing website downtime, data loss, and potential full system compromise through remote code execution. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR, if personal data is exposed or services are interrupted. The attack requires only Subscriber-level access, which is commonly granted to registered users or customers, increasing the risk from insider threats or compromised user accounts. Additionally, the ability to execute arbitrary code could allow attackers to pivot within networks, escalate privileges, or deploy ransomware, amplifying the threat to European organizations with interconnected IT environments.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately update the 'User Meta – User Profile Builder and User management' plugin to the latest patched version once available. If no patch exists yet, consider temporarily disabling the plugin or restricting its use to trusted administrators only. 2) Implement strict access controls and monitor user roles to minimize the number of users with Subscriber-level or higher privileges, applying the principle of least privilege. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious path traversal patterns targeting the plugin's endpoints. 4) Conduct regular file integrity monitoring on WordPress installations to detect unauthorized file deletions or modifications, especially of critical files like wp-config.php. 5) Harden WordPress installations by restricting file system permissions to prevent unauthorized file deletions by the web server user. 6) Monitor logs for unusual activity related to user profile updates or file operations. 7) Educate administrators and users about the risks of phishing or credential compromise that could lead to exploitation. These measures, combined, reduce the risk of exploitation and limit potential damage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9693: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in khaledsaikat User Meta – User Profile Builder and User management plugin
Description
The User Meta – User Profile Builder and User management plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the postInsertUserProcess function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-9693 is a high-severity vulnerability affecting the 'User Meta – User Profile Builder and User management' plugin for WordPress, developed by khaledsaikat. The vulnerability is classified as CWE-22, which corresponds to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. This issue exists in the postInsertUserProcess function in all plugin versions up to and including 3.1.2. The core problem is insufficient validation of file paths, allowing authenticated users with Subscriber-level privileges or higher to craft requests that delete arbitrary files on the server. The ability to delete critical files such as wp-config.php can lead to remote code execution (RCE), as attackers may remove or manipulate files that control WordPress configuration or security. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, requiring only low privileges and user interaction. Although no public exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. Exploitation involves leveraging the plugin's insufficient path sanitization to traverse directories and delete files outside the intended scope, potentially compromising the entire WordPress installation and underlying server. This vulnerability affects all versions of the plugin prior to the fix, and given the widespread use of WordPress and this plugin, the attack surface is considerable.
Potential Impact
For European organizations, the impact of CVE-2025-9693 can be severe. Many European businesses, governmental agencies, and non-profits rely on WordPress for their web presence, including e-commerce, content management, and internal portals. Exploitation could lead to unauthorized deletion of critical files, causing website downtime, data loss, and potential full system compromise through remote code execution. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR, if personal data is exposed or services are interrupted. The attack requires only Subscriber-level access, which is commonly granted to registered users or customers, increasing the risk from insider threats or compromised user accounts. Additionally, the ability to execute arbitrary code could allow attackers to pivot within networks, escalate privileges, or deploy ransomware, amplifying the threat to European organizations with interconnected IT environments.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately update the 'User Meta – User Profile Builder and User management' plugin to the latest patched version once available. If no patch exists yet, consider temporarily disabling the plugin or restricting its use to trusted administrators only. 2) Implement strict access controls and monitor user roles to minimize the number of users with Subscriber-level or higher privileges, applying the principle of least privilege. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious path traversal patterns targeting the plugin's endpoints. 4) Conduct regular file integrity monitoring on WordPress installations to detect unauthorized file deletions or modifications, especially of critical files like wp-config.php. 5) Harden WordPress installations by restricting file system permissions to prevent unauthorized file deletions by the web server user. 6) Monitor logs for unusual activity related to user profile updates or file operations. 7) Educate administrators and users about the risks of phishing or credential compromise that could lead to exploitation. These measures, combined, reduce the risk of exploitation and limit potential damage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-29T11:21:52.642Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a23e1c560fa9d94d4db
Added to database: 9/11/2025, 7:28:35 AM
Last enriched: 9/11/2025, 7:29:06 AM
Last updated: 9/11/2025, 8:38:49 AM
Views: 3
Related Threats
CVE-2025-58321: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Delta Electronics DIALink
CriticalCVE-2025-58320: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Delta Electronics DIALink
HighCVE-2025-9874: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in webcodingplace Ultimate Classified Listings
HighCVE-2025-9861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livingos ThemeLoom Widgets
MediumCVE-2025-9860: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in natata7 Mixtape
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.