CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files with race condition on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13646 affects the wpchill Image Gallery – Photo Grid & Video Gallery plugin for WordPress, specifically versions 2.13.1 and 2.13.2. The root cause is a lack of proper file type validation in the 'ajax_unzip_file' function, which handles file uploads. Authenticated users with Author-level permissions or higher can exploit this flaw to upload arbitrary files, bypassing restrictions on file types. The attack leverages a race condition on the server, which may allow the attacker to execute remote code by uploading malicious scripts or executables disguised as legitimate files. This vulnerability falls under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to remote code execution. The CVSS 3.1 base score is 7.5, indicating high severity due to network attack vector, low attack complexity, and significant impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction beyond authentication, making it a potent threat in environments where users have elevated privileges. No official patches have been linked yet, so mitigation relies on restricting user privileges, monitoring uploads, and applying any forthcoming updates promptly.
Potential Impact
If exploited, this vulnerability can lead to full compromise of affected WordPress sites. Attackers with Author-level access can upload malicious files, potentially executing arbitrary code on the server. This can result in unauthorized data access, site defacement, data loss, or use of the server as a pivot point for further attacks within an organization's network. The impact extends to confidentiality, integrity, and availability of the website and underlying infrastructure. Given WordPress's widespread use, especially among small to medium businesses and content creators, the vulnerability poses a significant risk to a large number of websites globally. Exploitation could also facilitate malware distribution, phishing campaigns, or ransomware deployment. The requirement for authenticated access limits exposure somewhat but does not eliminate risk, as many sites allow user registrations with Author-level permissions or higher. The race condition aspect may increase the complexity of exploitation but also the potential for successful remote code execution.
Mitigation Recommendations
Organizations should immediately audit user roles and restrict Author-level or higher permissions to trusted users only. Implement strict file upload controls, including server-side validation of file types and content scanning for malicious payloads. Employ web application firewalls (WAFs) configured to detect and block suspicious upload patterns or exploitation attempts. Monitor server logs for unusual file upload activities or race condition exploitation indicators. Until an official patch is released, consider disabling or replacing the vulnerable plugin with a secure alternative. Regularly update WordPress core and all plugins to their latest versions once patches become available. Conduct security awareness training for site administrators to recognize and respond to suspicious activities. Additionally, implement least privilege principles and network segmentation to limit the impact of any successful exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
Description
The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files with race condition on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-13646 affects the wpchill Image Gallery – Photo Grid & Video Gallery plugin for WordPress, specifically versions 2.13.1 and 2.13.2. The root cause is a lack of proper file type validation in the 'ajax_unzip_file' function, which handles file uploads. Authenticated users with Author-level permissions or higher can exploit this flaw to upload arbitrary files, bypassing restrictions on file types. The attack leverages a race condition on the server, which may allow the attacker to execute remote code by uploading malicious scripts or executables disguised as legitimate files. This vulnerability falls under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to remote code execution. The CVSS 3.1 base score is 7.5, indicating high severity due to network attack vector, low attack complexity, and significant impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction beyond authentication, making it a potent threat in environments where users have elevated privileges. No official patches have been linked yet, so mitigation relies on restricting user privileges, monitoring uploads, and applying any forthcoming updates promptly.
Potential Impact
If exploited, this vulnerability can lead to full compromise of affected WordPress sites. Attackers with Author-level access can upload malicious files, potentially executing arbitrary code on the server. This can result in unauthorized data access, site defacement, data loss, or use of the server as a pivot point for further attacks within an organization's network. The impact extends to confidentiality, integrity, and availability of the website and underlying infrastructure. Given WordPress's widespread use, especially among small to medium businesses and content creators, the vulnerability poses a significant risk to a large number of websites globally. Exploitation could also facilitate malware distribution, phishing campaigns, or ransomware deployment. The requirement for authenticated access limits exposure somewhat but does not eliminate risk, as many sites allow user registrations with Author-level permissions or higher. The race condition aspect may increase the complexity of exploitation but also the potential for successful remote code execution.
Mitigation Recommendations
Organizations should immediately audit user roles and restrict Author-level or higher permissions to trusted users only. Implement strict file upload controls, including server-side validation of file types and content scanning for malicious payloads. Employ web application firewalls (WAFs) configured to detect and block suspicious upload patterns or exploitation attempts. Monitor server logs for unusual file upload activities or race condition exploitation indicators. Until an official patch is released, consider disabling or replacing the vulnerable plugin with a secure alternative. Regularly update WordPress core and all plugins to their latest versions once patches become available. Conduct security awareness training for site administrators to recognize and respond to suspicious activities. Additionally, implement least privilege principles and network segmentation to limit the impact of any successful exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T07:02:51.377Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692fa033619fec35b4509f22
Added to database: 12/3/2025, 2:28:03 AM
Last enriched: 2/27/2026, 10:06:45 AM
Last updated: 3/22/2026, 1:35:36 AM
Views: 142
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.