Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13641: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

0
High
VulnerabilityCVE-2025-13641cvecve-2025-13641cwe-98
Published: Thu Dec 18 2025 (12/18/2025, 09:21:29 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

Description

The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.59.12 via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.

AI-Powered Analysis

AILast updated: 12/25/2025, 10:42:18 UTC

Technical Analysis

CVE-2025-13641 is a Local File Inclusion vulnerability classified under CWE-98 that affects the 'Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery' WordPress plugin developed by smub. The vulnerability exists in all plugin versions up to and including 3.59.12 and is triggered via the 'template' shortcode parameter. The root cause is insufficient validation of the input parameter, which allows attackers to specify absolute file paths. Authenticated users with Contributor-level privileges or higher can exploit this flaw to include arbitrary PHP files on the server. This inclusion bypasses web server restrictions such as .htaccess rules, enabling execution of malicious code within the WordPress environment. The impact ranges from information disclosure to code execution. While the vulnerability itself does not allow unauthenticated exploitation, it significantly raises the risk profile for sites where attackers have obtained contributor or higher access. Furthermore, if combined with other vulnerabilities like arbitrary file upload, attackers could achieve remote code execution, leading to full server compromise. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high severity with network attack vector, low attack complexity, and no user interaction required. No public patches or known exploits have been reported at the time of publication, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

For European organizations, this vulnerability poses a serious risk to WordPress-based websites using the NextGEN Gallery plugin. Exploitation can lead to unauthorized disclosure of sensitive data stored or processed by the website, including user information and internal configuration files. The ability to execute arbitrary PHP code within the WordPress context can allow attackers to manipulate website content, deface pages, or pivot to deeper network layers. In cases where arbitrary file upload vulnerabilities coexist, attackers could gain full remote code execution, potentially compromising the entire web server and connected infrastructure. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to data breaches. The requirement for authenticated access somewhat limits the attack surface but does not eliminate risk, as contributor-level accounts are common in collaborative environments. Given the widespread use of WordPress and the popularity of NextGEN Gallery, the vulnerability could affect a broad range of sectors including e-commerce, media, education, and government websites across Europe.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the NextGEN Gallery plugin. If the plugin is installed and running a vulnerable version (up to 3.59.12), they should upgrade to the latest patched version as soon as it becomes available. In the absence of an official patch, organizations should consider temporarily disabling or removing the plugin to eliminate the attack vector. Additionally, review and restrict user roles and permissions to minimize the number of users with Contributor-level or higher access. Implement Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit LFI via the 'template' shortcode parameter. Monitor logs for suspicious activity related to file inclusion attempts. Harden the WordPress environment by disabling PHP execution in upload directories and restricting file system permissions to limit the impact of potential exploitation. Regularly back up website data and test restoration procedures to ensure rapid recovery in case of compromise. Finally, educate site administrators and content contributors about the risks of privilege misuse and the importance of applying security updates promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T02:50:31.614Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943cc484eb3efac36794b0f

Added to database: 12/18/2025, 9:41:28 AM

Last enriched: 12/25/2025, 10:42:18 AM

Last updated: 2/6/2026, 5:49:58 PM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats