CVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-13645 is a path traversal vulnerability classified under CWE-22 found in the wpchill Image Gallery – Photo Grid & Video Gallery WordPress plugin, specifically version 2.13.1. The vulnerability arises from insufficient validation of file paths in the 'ajax_unzip_file' function, which is responsible for handling file unzip operations. Authenticated users with Author-level access or higher can exploit this flaw to delete arbitrary files on the hosting server by manipulating the file path input to traverse directories outside the intended restricted folder. This arbitrary file deletion capability is particularly dangerous because it can be leveraged to remove critical WordPress files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deleting such files can lead to denial of service or enable attackers to upload malicious files or execute arbitrary code remotely, effectively compromising the entire web server. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only privileges of an authenticated Author user, without any user interaction. Although no active exploits have been reported in the wild, the ease of exploitation combined with the potential for full server compromise makes this a critical issue for affected WordPress sites. The vulnerability was published on December 3, 2025, and no official patches or updates have been linked yet, emphasizing the need for immediate attention from site administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites running WordPress with the vulnerable wpchill Image Gallery plugin. Exploitation can lead to unauthorized deletion of critical files, resulting in website downtime, data loss, and potential full server compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to data breaches involving personal or sensitive information protected under GDPR. Organizations relying on WordPress for e-commerce, customer portals, or public-facing services are particularly vulnerable. The requirement for Author-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Given the widespread use of WordPress across Europe, especially in small and medium enterprises and public sector websites, the impact could be broad and severe if not mitigated promptly.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the wpchill Image Gallery – Photo Grid & Video Gallery plugin, specifically version 2.13.1. 2. Restrict Author-level user privileges to only trusted personnel and review user accounts for suspicious activity. 3. Implement strict file system permissions on the server to prevent unauthorized file deletions by the web server user. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block path traversal attempts targeting the 'ajax_unzip_file' function. 5. Monitor server logs for unusual file deletion patterns or unauthorized access attempts. 6. Until an official patch is released, consider disabling or removing the vulnerable plugin entirely. 7. Regularly back up WordPress files and databases to enable quick restoration in case of compromise. 8. Follow wpchill and WordPress security advisories closely for updates or patches addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
Description
The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-13645 is a path traversal vulnerability classified under CWE-22 found in the wpchill Image Gallery – Photo Grid & Video Gallery WordPress plugin, specifically version 2.13.1. The vulnerability arises from insufficient validation of file paths in the 'ajax_unzip_file' function, which is responsible for handling file unzip operations. Authenticated users with Author-level access or higher can exploit this flaw to delete arbitrary files on the hosting server by manipulating the file path input to traverse directories outside the intended restricted folder. This arbitrary file deletion capability is particularly dangerous because it can be leveraged to remove critical WordPress files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deleting such files can lead to denial of service or enable attackers to upload malicious files or execute arbitrary code remotely, effectively compromising the entire web server. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only privileges of an authenticated Author user, without any user interaction. Although no active exploits have been reported in the wild, the ease of exploitation combined with the potential for full server compromise makes this a critical issue for affected WordPress sites. The vulnerability was published on December 3, 2025, and no official patches or updates have been linked yet, emphasizing the need for immediate attention from site administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites running WordPress with the vulnerable wpchill Image Gallery plugin. Exploitation can lead to unauthorized deletion of critical files, resulting in website downtime, data loss, and potential full server compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to data breaches involving personal or sensitive information protected under GDPR. Organizations relying on WordPress for e-commerce, customer portals, or public-facing services are particularly vulnerable. The requirement for Author-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Given the widespread use of WordPress across Europe, especially in small and medium enterprises and public sector websites, the impact could be broad and severe if not mitigated promptly.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the wpchill Image Gallery – Photo Grid & Video Gallery plugin, specifically version 2.13.1. 2. Restrict Author-level user privileges to only trusted personnel and review user accounts for suspicious activity. 3. Implement strict file system permissions on the server to prevent unauthorized file deletions by the web server user. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block path traversal attempts targeting the 'ajax_unzip_file' function. 5. Monitor server logs for unusual file deletion patterns or unauthorized access attempts. 6. Until an official patch is released, consider disabling or removing the vulnerable plugin entirely. 7. Regularly back up WordPress files and databases to enable quick restoration in case of compromise. 8. Follow wpchill and WordPress security advisories closely for updates or patches addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T06:49:47.375Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692fa033619fec35b4509f1a
Added to database: 12/3/2025, 2:28:03 AM
Last enriched: 12/3/2025, 2:43:12 AM
Last updated: 12/3/2025, 7:26:06 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13486: CWE-94 Improper Control of Generation of Code ('Code Injection') in hwk-fr Advanced Custom Fields: Extended
CriticalCVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
UnknownCVE-2025-13495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmanageninja FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
MediumCVE-2025-12585: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mxchat MxChat – AI Chatbot for WordPress
MediumCVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.