The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
References
Configurations
No configuration.
History
12 Dec 2025, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-12 04:15
Updated : 2025-12-12 15:17
NVD link : CVE-2025-13320
Mitre link : CVE-2025-13320
CVE.ORG link : CVE-2025-13320
JSON object : View
Products Affected
No product.
CWE
CWE-73
External Control of File Name or Path
