CVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.59.12 via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.
AI Analysis
Technical Summary
CVE-2025-13641 is a critical path traversal vulnerability (CWE-22) affecting the NextGEN Gallery plugin for WordPress, specifically versions up to and including 3.59.12. The vulnerability arises from improper validation of the 'template' shortcode parameter, which accepts absolute file paths without sufficient restriction. Authenticated users with Contributor-level permissions or higher can exploit this flaw to perform local file inclusion (LFI), allowing them to include and execute arbitrary PHP files on the server. This bypasses typical web server restrictions such as .htaccess rules designed to prevent unauthorized file execution. The attack vector requires network access and authentication but no additional user interaction. Successful exploitation can lead to severe consequences including disclosure of sensitive information, execution of arbitrary code within the WordPress environment, and potentially full remote code execution if combined with other vulnerabilities like arbitrary file upload. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity. Although no public exploits are known at this time, the widespread deployment of NextGEN Gallery and the common use of Contributor-level accounts in WordPress installations make this a significant threat. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, the impact of CVE-2025-13641 can be substantial. Many European companies, government agencies, and educational institutions rely on WordPress for their web presence, often using popular plugins like NextGEN Gallery for media management. Exploitation could lead to unauthorized disclosure of sensitive data, defacement of websites, or full server compromise. This is particularly critical for sectors handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The ability for relatively low-privileged authenticated users to escalate privileges and execute code increases insider threat risks and the potential for external attackers to leverage compromised accounts. Additionally, the bypass of .htaccess restrictions undermines common defense-in-depth strategies. The threat is amplified in environments where patch management is slow or where Contributor-level accounts are widely assigned. The potential for chained attacks involving arbitrary file uploads further raises the risk of persistent and stealthy intrusions.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the NextGEN Gallery plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Restrict Contributor-level user permissions where possible, limiting the number of users with such access. Implement strict file system permissions to prevent unauthorized PHP file uploads and execution. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit the 'template' shortcode parameter with path traversal patterns. Monitor logs for suspicious activity related to shortcode usage and file inclusion attempts. Regularly update WordPress core and plugins to the latest versions once patches become available. Additionally, consider isolating WordPress environments and using security plugins that enforce input validation and restrict shortcode parameters. Conduct user training to minimize the risk of credential compromise that could enable exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
Description
The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.59.12 via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.
AI-Powered Analysis
Technical Analysis
CVE-2025-13641 is a critical path traversal vulnerability (CWE-22) affecting the NextGEN Gallery plugin for WordPress, specifically versions up to and including 3.59.12. The vulnerability arises from improper validation of the 'template' shortcode parameter, which accepts absolute file paths without sufficient restriction. Authenticated users with Contributor-level permissions or higher can exploit this flaw to perform local file inclusion (LFI), allowing them to include and execute arbitrary PHP files on the server. This bypasses typical web server restrictions such as .htaccess rules designed to prevent unauthorized file execution. The attack vector requires network access and authentication but no additional user interaction. Successful exploitation can lead to severe consequences including disclosure of sensitive information, execution of arbitrary code within the WordPress environment, and potentially full remote code execution if combined with other vulnerabilities like arbitrary file upload. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity. Although no public exploits are known at this time, the widespread deployment of NextGEN Gallery and the common use of Contributor-level accounts in WordPress installations make this a significant threat. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations, the impact of CVE-2025-13641 can be substantial. Many European companies, government agencies, and educational institutions rely on WordPress for their web presence, often using popular plugins like NextGEN Gallery for media management. Exploitation could lead to unauthorized disclosure of sensitive data, defacement of websites, or full server compromise. This is particularly critical for sectors handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The ability for relatively low-privileged authenticated users to escalate privileges and execute code increases insider threat risks and the potential for external attackers to leverage compromised accounts. Additionally, the bypass of .htaccess restrictions undermines common defense-in-depth strategies. The threat is amplified in environments where patch management is slow or where Contributor-level accounts are widely assigned. The potential for chained attacks involving arbitrary file uploads further raises the risk of persistent and stealthy intrusions.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations for the presence of the NextGEN Gallery plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Restrict Contributor-level user permissions where possible, limiting the number of users with such access. Implement strict file system permissions to prevent unauthorized PHP file uploads and execution. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit the 'template' shortcode parameter with path traversal patterns. Monitor logs for suspicious activity related to shortcode usage and file inclusion attempts. Regularly update WordPress core and plugins to the latest versions once patches become available. Additionally, consider isolating WordPress environments and using security plugins that enforce input validation and restrict shortcode parameters. Conduct user training to minimize the risk of credential compromise that could enable exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T02:50:31.614Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943cc484eb3efac36794b0f
Added to database: 12/18/2025, 9:41:28 AM
Last enriched: 12/18/2025, 9:56:47 AM
Last updated: 12/18/2025, 2:35:11 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9787: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zohocorp ManageEngine Applications Manager
MediumCVE-2025-64461: CWE-787 Out-of-bounds Write in NI LabVIEW
HighCVE-2025-1030: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Utarit Informatics Services Inc. SoliClub
HighCVE-2025-1029: CWE-798 Use of Hard-coded Credentials in Utarit Information Services Inc. SoliClub
HighCVE-2025-14861: Vulnerability in Mozilla Firefox
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.