The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.7. This is due to insufficient input validation on the user-supplied `first_file` parameter in the `zip()` function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files and directories outside the intended `/wp-content/plugins/` directory, which can contain sensitive information such as wp-config.php.

Project Subscriptions

Vendors Products
Thebaldfatguy Subscribe
Bfg Tools – Extension Zipper Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Thebaldfatguy
Thebaldfatguy bfg Tools – Extension Zipper
Wordpress
Wordpress wordpress
Vendors & Products Thebaldfatguy
Thebaldfatguy bfg Tools – Extension Zipper
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.7. This is due to insufficient input validation on the user-supplied `first_file` parameter in the `zip()` function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files and directories outside the intended `/wp-content/plugins/` directory, which can contain sensitive information such as wp-config.php.
Title BFG Tools – Extension Zipper <= 1.0.7 - Authenticated (Administrator+) Path Traversal via 'first_file' Parameter
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-02-17T15:06:55.368Z

Reserved: 2025-11-25T18:54:26.188Z

Link: CVE-2025-13681

cve-icon Vulnrichment

Updated: 2026-02-17T15:06:51.046Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-14T04:15:56.123

Modified: 2026-02-18T17:52:44.520

Link: CVE-2025-13681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-16T12:03:23Z

Weaknesses