CVE-2025-13320

MEDIUM

WP User Manager <2.9.12 - Privilege Escalation

Title source: llm
STIX 2.1

Description

The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.

Scores

CVSS v3 6.8
EPSS 0.0045
EPSS Percentile 63.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-73
Status published
Products (1)
wpusermanager/WP User Manager – User Profile Builder & Membership < 2.9.12
Published Dec 12, 2025
Tracked Since Feb 18, 2026