Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools
  • Home
  • Vulnerabilities
  • CVE Alert: CVE-2025-9693 – khaledsaikat – User Meta – User Profile Builder and User management plugin
  • Vulnerabilities

CVE Alert: CVE-2025-9693 – khaledsaikat – User Meta – User Profile Builder and User management plugin

September 11, 2025

CVE-2025-9693

HIGHNo exploitation known

The User Meta – User Profile Builder and User management plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the postInsertUserProcess function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

CVSS v3.1 (8)
Vendor
khaledsaikat
Product
User Meta – User Profile Builder and User management plugin
Versions
* lte 3.1.2
CWE
CWE-22, CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-11T07:25:00.225Z
Updated
2025-09-11T07:25:00.225Z
References
https://www.wordfence.com/threat-intel/vulnerabilities/id/d482f3a1-4a5a-4382-88b1-fd3b91605694?source=cve
https://plugins.trac.wordpress.org/browser/user-meta/tags/3.1.2/models/classes/UserInsert.php#L642

AI Summary Analysis

Risk verdict

Why this matters

Most likely attack path

Who is most exposed

Detection ideas

  • Monitor for authenticated file-deletion events from web server logs tied to user actions, especially from Subscriber+ roles.
  • Look for atypical file-delete attempts outside permitted directories, including path traversal-like patterns (../../, etc.).
  • Audit access- and error-logs around file-system operations following user management events in the plugin.
  • Alert on repeated delete requests targeting configuration or core PHP files.
  • Verify plugin version and update activity to identify known-broken instances.

Mitigation and prioritisation

  • Patch or upgrade to the fixed release; if unavailable, disable or remove the plugin or restrict Subscriber+ capabilities.
  • Enforce least privilege; restrict file-delete permissions for non-admin roles.
  • Enable WAF/IPS rules to block path traversal indicators and anomalous file operations.
  • Implement robust backups with tested restore procedures and verify integrity after admin actions.
  • Incorporate change-management notes for the upgrade and monitor for post-patch anomalies.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

Buy Me A Coffee
Patreon

To keep up to date follow us on the below channels.

Telegram Discord Reddit LinkedIn Mastodon
Tags: CVE, cve-2025-9693, khaledsaikat, OSINT, threatintel, user-meta-user-profile-builder-and-user-management-plugin

Post navigation

Previous: Anthropic’s Claude Code Runs Code To Test If It Is Safe – Which Might Be A Bigmistake

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-8417 – idiatech – Catalog Importer, Scraper & Crawler

September 11, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9693 – khaledsaikat – User Meta – User Profile Builder and User management plugin

September 11, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8422 – fassionstorage – Propovoice: All-in-One Client Management System

September 11, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-9073 – maheshmthorat – All in one Minifier

September 11, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-8425 – mythemeshop – My WP Translate

September 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel