High severity8.1NVD Advisory· Published Nov 21, 2025· Updated Apr 15, 2026
CVE-2025-13322
CVE-2025-13322
Description
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2.0. This is due to the wpag_uploadaudio_callback() AJAX handler not properly validating user-supplied file paths in the audio_upload parameter before passing them to unlink(). This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when critical files like wp-config.php are deleted.
Affected products
1- Range: <=2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/wp-audio-gallery/tags/2.0/wp-audio-gallery.phpnvd
- plugins.trac.wordpress.org/browser/wp-audio-gallery/tags/2.0/wp-audio-gallery.phpnvd
- plugins.trac.wordpress.org/browser/wp-audio-gallery/tags/2.0/wp-audio-gallery.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/101675ae-88cf-42fc-b9ea-5dd37cdf7464nvd
News mentions
0No linked articles in our index yet.