CVE-2025-12957: CWE-434 Unrestricted Upload of File with Dangerous Type in plugins360 All-in-One Video Gallery
The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.5.7. This is due to insufficient file type validation detecting VTT files, allowing double extension files to bypass sanitization while being accepted as a valid VTT file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-12957 is a critical vulnerability categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the All-in-One Video Gallery plugin for WordPress, versions up to and including 4.5.7. The core issue stems from insufficient validation of uploaded file types, specifically VTT (Web Video Text Tracks) files. The plugin’s sanitization mechanism fails to properly detect and block files with double extensions (e.g., malicious.php.vtt), allowing attackers to upload arbitrary files disguised as valid VTT files. This flaw can be exploited by authenticated users with author-level privileges or higher, enabling them to place malicious files on the server. Such files could be leveraged to execute remote code, leading to full compromise of the web server hosting the WordPress site. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS v3.1 score of 8.8 reflects high confidentiality, integrity, and availability impacts, with low attack complexity and privileges required. Although no known exploits have been reported in the wild, the potential for remote code execution makes this a significant threat. The vulnerability was publicly disclosed on January 16, 2026, and no official patches have been linked yet, indicating the need for immediate mitigation steps by site administrators.
Potential Impact
The vulnerability allows attackers with author-level access to upload arbitrary files, which can lead to remote code execution on the web server. This can result in complete compromise of the affected WordPress site, including unauthorized access to sensitive data, defacement, data loss, or use of the server as a pivot point for further attacks within the network. The integrity of the website content and availability of services can be severely impacted, potentially causing reputational damage and operational disruption. Since WordPress powers a significant portion of the web, and plugins like All-in-One Video Gallery are widely used, the scope of affected systems is substantial. Attackers exploiting this vulnerability can bypass typical file upload restrictions, making it easier to deploy web shells or malware. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with multiple authors or compromised credentials. Organizations relying on this plugin face elevated risk of targeted attacks and should consider this vulnerability a high priority for remediation.
Mitigation Recommendations
1. Immediately restrict author-level users from uploading files until a patch is available. 2. Implement strict file upload validation on the server side, including checking MIME types, file extensions, and scanning for double extensions. 3. Use web application firewalls (WAFs) with custom rules to detect and block suspicious file uploads, especially those containing double extensions or unusual file types. 4. Monitor file upload directories for unexpected file types and newly added files, using automated alerting systems. 5. Limit the number of users with author-level or higher privileges and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 6. Regularly update WordPress core, plugins, and themes to the latest versions once patches for this vulnerability are released. 7. Conduct periodic security audits and penetration testing focused on file upload functionalities. 8. Consider isolating the upload directory with restrictive permissions and disabling execution of uploaded files where possible. 9. Backup website data regularly to enable quick recovery in case of compromise. 10. Stay informed through official plugin channels and security advisories for patch releases and updates.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2025-12957: CWE-434 Unrestricted Upload of File with Dangerous Type in plugins360 All-in-One Video Gallery
Description
The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.5.7. This is due to insufficient file type validation detecting VTT files, allowing double extension files to bypass sanitization while being accepted as a valid VTT file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12957 is a critical vulnerability categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the All-in-One Video Gallery plugin for WordPress, versions up to and including 4.5.7. The core issue stems from insufficient validation of uploaded file types, specifically VTT (Web Video Text Tracks) files. The plugin’s sanitization mechanism fails to properly detect and block files with double extensions (e.g., malicious.php.vtt), allowing attackers to upload arbitrary files disguised as valid VTT files. This flaw can be exploited by authenticated users with author-level privileges or higher, enabling them to place malicious files on the server. Such files could be leveraged to execute remote code, leading to full compromise of the web server hosting the WordPress site. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS v3.1 score of 8.8 reflects high confidentiality, integrity, and availability impacts, with low attack complexity and privileges required. Although no known exploits have been reported in the wild, the potential for remote code execution makes this a significant threat. The vulnerability was publicly disclosed on January 16, 2026, and no official patches have been linked yet, indicating the need for immediate mitigation steps by site administrators.
Potential Impact
The vulnerability allows attackers with author-level access to upload arbitrary files, which can lead to remote code execution on the web server. This can result in complete compromise of the affected WordPress site, including unauthorized access to sensitive data, defacement, data loss, or use of the server as a pivot point for further attacks within the network. The integrity of the website content and availability of services can be severely impacted, potentially causing reputational damage and operational disruption. Since WordPress powers a significant portion of the web, and plugins like All-in-One Video Gallery are widely used, the scope of affected systems is substantial. Attackers exploiting this vulnerability can bypass typical file upload restrictions, making it easier to deploy web shells or malware. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with multiple authors or compromised credentials. Organizations relying on this plugin face elevated risk of targeted attacks and should consider this vulnerability a high priority for remediation.
Mitigation Recommendations
1. Immediately restrict author-level users from uploading files until a patch is available. 2. Implement strict file upload validation on the server side, including checking MIME types, file extensions, and scanning for double extensions. 3. Use web application firewalls (WAFs) with custom rules to detect and block suspicious file uploads, especially those containing double extensions or unusual file types. 4. Monitor file upload directories for unexpected file types and newly added files, using automated alerting systems. 5. Limit the number of users with author-level or higher privileges and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 6. Regularly update WordPress core, plugins, and themes to the latest versions once patches for this vulnerability are released. 7. Conduct periodic security audits and penetration testing focused on file upload functionalities. 8. Consider isolating the upload directory with restrictive permissions and disabling execution of uploaded files where possible. 9. Backup website data regularly to enable quick recovery in case of compromise. 10. Stay informed through official plugin channels and security advisories for patch releases and updates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T15:26:13.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6969c56d7c726673b6f0ba61
Added to database: 1/16/2026, 4:58:21 AM
Last enriched: 2/27/2026, 9:22:07 PM
Last updated: 3/26/2026, 3:35:24 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.