Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

0
High
VulnerabilityCVE-2025-13641cvecve-2025-13641cwe-22
Published: Thu Dec 18 2025 (12/18/2025, 09:21:29 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

Description

The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.59.12 via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.

AI-Powered Analysis

AILast updated: 12/18/2025, 09:56:47 UTC

Technical Analysis

CVE-2025-13641 is a critical path traversal vulnerability (CWE-22) affecting the NextGEN Gallery plugin for WordPress, specifically versions up to and including 3.59.12. The vulnerability arises from improper validation of the 'template' shortcode parameter, which accepts absolute file paths without sufficient restriction. Authenticated users with Contributor-level permissions or higher can exploit this flaw to perform local file inclusion (LFI), allowing them to include and execute arbitrary PHP files on the server. This bypasses typical web server restrictions such as .htaccess rules designed to prevent unauthorized file execution. The attack vector requires network access and authentication but no additional user interaction. Successful exploitation can lead to severe consequences including disclosure of sensitive information, execution of arbitrary code within the WordPress environment, and potentially full remote code execution if combined with other vulnerabilities like arbitrary file upload. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity. Although no public exploits are known at this time, the widespread deployment of NextGEN Gallery and the common use of Contributor-level accounts in WordPress installations make this a significant threat. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by administrators.

Potential Impact

For European organizations, the impact of CVE-2025-13641 can be substantial. Many European companies, government agencies, and educational institutions rely on WordPress for their web presence, often using popular plugins like NextGEN Gallery for media management. Exploitation could lead to unauthorized disclosure of sensitive data, defacement of websites, or full server compromise. This is particularly critical for sectors handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The ability for relatively low-privileged authenticated users to escalate privileges and execute code increases insider threat risks and the potential for external attackers to leverage compromised accounts. Additionally, the bypass of .htaccess restrictions undermines common defense-in-depth strategies. The threat is amplified in environments where patch management is slow or where Contributor-level accounts are widely assigned. The potential for chained attacks involving arbitrary file uploads further raises the risk of persistent and stealthy intrusions.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations for the presence of the NextGEN Gallery plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Restrict Contributor-level user permissions where possible, limiting the number of users with such access. Implement strict file system permissions to prevent unauthorized PHP file uploads and execution. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit the 'template' shortcode parameter with path traversal patterns. Monitor logs for suspicious activity related to shortcode usage and file inclusion attempts. Regularly update WordPress core and plugins to the latest versions once patches become available. Additionally, consider isolating WordPress environments and using security plugins that enforce input validation and restrict shortcode parameters. Conduct user training to minimize the risk of credential compromise that could enable exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T02:50:31.614Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943cc484eb3efac36794b0f

Added to database: 12/18/2025, 9:41:28 AM

Last enriched: 12/18/2025, 9:56:47 AM

Last updated: 12/18/2025, 2:35:11 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats