Description
The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
Problem types
CWE-73 External Control of File Name or Path
Product status
* (semver)
Timeline
| 2025-12-11: | Disclosed |
Credits
JEONG YU CHAN
References
www.wordfence.com/...-bec2-4fcf-9fe2-46b626b3dae9?source=cve
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
plugins.trac.wordpress.org/...s/forms/trait-wpum-account.php
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.