Description
The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
INFO
Published Date :
2025-12-12T03:20:51.143Z
Last Modified :
2025-12-12T03:20:51.143Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2025-13320 vulnerability.
| Vendors | Products |
|---|---|
| Wordpress |
|
| Wpusermanager |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-13320.