Plattform
wordpress
Komponente
user-meta
Behoben in
3.1.3
CVE-2025-9693 describes an Arbitrary File Access vulnerability discovered in the User Meta – User Profile Builder and User management plugin for WordPress. This flaw allows authenticated attackers, even with Subscriber-level access, to delete arbitrary files on the server. Successful exploitation could lead to remote code execution, particularly if critical configuration files like wp-config.php are targeted. The vulnerability impacts versions 0.0.0 through 3.1.2 and has been resolved in version 3.1.3.
The primary impact of CVE-2025-9693 is the ability for an authenticated attacker to delete files on the WordPress server. While the vulnerability requires authentication (Subscriber level or higher), this is a relatively low barrier to entry for many WordPress installations. The most severe consequence arises when attackers delete critical files such as wp-config.php, which contains database credentials and other sensitive configuration information. Deletion of this file can effectively grant the attacker complete control over the WordPress site and potentially the underlying server. The ability to delete other files could also lead to denial of service or the modification of website content. This vulnerability shares similarities with other file access vulnerabilities where insufficient validation allows for unauthorized file manipulation.
CVE-2025-9693 was publicly disclosed on 2025-09-11. Its severity is rated HIGH (CVSS 8.0). Currently, there are no known public exploits or active campaigns targeting this vulnerability. It has not yet been added to the CISA KEV catalog. The ease of exploitation, combined with the potential for RCE, warrants careful attention and prompt patching.
WordPress websites utilizing the User Meta – User Profile Builder and User management plugin, particularly those with Subscriber-level users or higher who have access to user management functionalities, are at risk. Shared hosting environments where users have limited control over file permissions are also particularly vulnerable, as are WordPress installations with outdated plugins and weak security configurations.
• wordpress / plugin:
wp plugin list --status=inactive | grep 'user-meta'• wordpress / plugin:
wp plugin update --all• wordpress / server:
find /var/www/html/wp-content/plugins/user-meta/ -type f -name '*.php' -print0 | xargs -0 grep -i 'postInsertUserProcess'• generic web:
curl -I https://your-wordpress-site.com/wp-content/plugins/user-meta/ | grep 'Server'disclosure
patch
Exploit-Status
EPSS
0.16% (37% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-9693 is to immediately upgrade the User Meta – User Profile Builder and User management plugin to version 3.1.3 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. While a direct WAF rule to prevent file deletion is difficult without specific knowledge of the vulnerable endpoint, restricting file access permissions on the server to the WordPress user can limit the potential damage. Regularly review file permissions and ensure that the WordPress user has only the necessary access rights. Monitor WordPress logs for suspicious file deletion attempts. After upgrading, confirm the fix by attempting to access a non-existent file through the vulnerable endpoint; the request should now return a 403 Forbidden error.
Actualice el plugin User Meta – User Profile Builder and User management plugin a la versión 3.1.3 o superior para mitigar la vulnerabilidad de eliminación arbitraria de archivos. Esta actualización corrige la falta de validación adecuada de las rutas de los archivos, previniendo que atacantes autenticados eliminen archivos sensibles en el servidor.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-9693 is a vulnerability in the User Meta plugin for WordPress allowing authenticated users to delete arbitrary files, potentially leading to remote code execution.
You are affected if your WordPress site uses the User Meta plugin in versions 0.0.0 through 3.1.2.
Upgrade the User Meta plugin to version 3.1.3 or later to resolve the vulnerability.
While no active exploitation has been confirmed, the ease of exploitation suggests a high probability of exploitation in the wild.
Refer to the plugin developer's website or WordPress.org plugin repository for the official advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.