Vulnerability Description
The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_avatar_ajax() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://headwayapp.co/wp-user-frontend-changelog
- https://www.wordfence.com/threat-intel/vulnerabilities/id/eeb71c31-9e56-4b58-9cf
FAQ
What is CVE-2025-3055?
CVE-2025-3055 is a vulnerability with a CVSS score of 8.1 (HIGH). The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_avatar_ajax() function in all versions up to, and includin...
How severe is CVE-2025-3055?
CVE-2025-3055 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3055?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.