Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery

0
High
VulnerabilityCVE-2025-13645cvecve-2025-13645cwe-22
Published: Wed Dec 03 2025 (12/03/2025, 02:25:28 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 12/03/2025, 02:43:12 UTC

Technical Analysis

CVE-2025-13645 is a path traversal vulnerability classified under CWE-22 found in the wpchill Image Gallery – Photo Grid & Video Gallery WordPress plugin, specifically version 2.13.1. The vulnerability arises from insufficient validation of file paths in the 'ajax_unzip_file' function, which is responsible for handling file unzip operations. Authenticated users with Author-level access or higher can exploit this flaw to delete arbitrary files on the hosting server by manipulating the file path input to traverse directories outside the intended restricted folder. This arbitrary file deletion capability is particularly dangerous because it can be leveraged to remove critical WordPress files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deleting such files can lead to denial of service or enable attackers to upload malicious files or execute arbitrary code remotely, effectively compromising the entire web server. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only privileges of an authenticated Author user, without any user interaction. Although no active exploits have been reported in the wild, the ease of exploitation combined with the potential for full server compromise makes this a critical issue for affected WordPress sites. The vulnerability was published on December 3, 2025, and no official patches or updates have been linked yet, emphasizing the need for immediate attention from site administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites running WordPress with the vulnerable wpchill Image Gallery plugin. Exploitation can lead to unauthorized deletion of critical files, resulting in website downtime, data loss, and potential full server compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to data breaches involving personal or sensitive information protected under GDPR. Organizations relying on WordPress for e-commerce, customer portals, or public-facing services are particularly vulnerable. The requirement for Author-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Given the widespread use of WordPress across Europe, especially in small and medium enterprises and public sector websites, the impact could be broad and severe if not mitigated promptly.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the wpchill Image Gallery – Photo Grid & Video Gallery plugin, specifically version 2.13.1. 2. Restrict Author-level user privileges to only trusted personnel and review user accounts for suspicious activity. 3. Implement strict file system permissions on the server to prevent unauthorized file deletions by the web server user. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block path traversal attempts targeting the 'ajax_unzip_file' function. 5. Monitor server logs for unusual file deletion patterns or unauthorized access attempts. 6. Until an official patch is released, consider disabling or removing the vulnerable plugin entirely. 7. Regularly back up WordPress files and databases to enable quick restoration in case of compromise. 8. Follow wpchill and WordPress security advisories closely for updates or patches addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T06:49:47.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692fa033619fec35b4509f1a

Added to database: 12/3/2025, 2:28:03 AM

Last enriched: 12/3/2025, 2:43:12 AM

Last updated: 12/3/2025, 7:26:06 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats