Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery

0
High
VulnerabilityCVE-2025-13646cvecve-2025-13646cwe-434
Published: Wed Dec 03 2025 (12/03/2025, 02:25:30 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files with race condition on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:06:45 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13646 affects the wpchill Image Gallery – Photo Grid & Video Gallery plugin for WordPress, specifically versions 2.13.1 and 2.13.2. The root cause is a lack of proper file type validation in the 'ajax_unzip_file' function, which handles file uploads. Authenticated users with Author-level permissions or higher can exploit this flaw to upload arbitrary files, bypassing restrictions on file types. The attack leverages a race condition on the server, which may allow the attacker to execute remote code by uploading malicious scripts or executables disguised as legitimate files. This vulnerability falls under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to remote code execution. The CVSS 3.1 base score is 7.5, indicating high severity due to network attack vector, low attack complexity, and significant impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction beyond authentication, making it a potent threat in environments where users have elevated privileges. No official patches have been linked yet, so mitigation relies on restricting user privileges, monitoring uploads, and applying any forthcoming updates promptly.

Potential Impact

If exploited, this vulnerability can lead to full compromise of affected WordPress sites. Attackers with Author-level access can upload malicious files, potentially executing arbitrary code on the server. This can result in unauthorized data access, site defacement, data loss, or use of the server as a pivot point for further attacks within an organization's network. The impact extends to confidentiality, integrity, and availability of the website and underlying infrastructure. Given WordPress's widespread use, especially among small to medium businesses and content creators, the vulnerability poses a significant risk to a large number of websites globally. Exploitation could also facilitate malware distribution, phishing campaigns, or ransomware deployment. The requirement for authenticated access limits exposure somewhat but does not eliminate risk, as many sites allow user registrations with Author-level permissions or higher. The race condition aspect may increase the complexity of exploitation but also the potential for successful remote code execution.

Mitigation Recommendations

Organizations should immediately audit user roles and restrict Author-level or higher permissions to trusted users only. Implement strict file upload controls, including server-side validation of file types and content scanning for malicious payloads. Employ web application firewalls (WAFs) configured to detect and block suspicious upload patterns or exploitation attempts. Monitor server logs for unusual file upload activities or race condition exploitation indicators. Until an official patch is released, consider disabling or replacing the vulnerable plugin with a secure alternative. Regularly update WordPress core and all plugins to their latest versions once patches become available. Conduct security awareness training for site administrators to recognize and respond to suspicious activities. Additionally, implement least privilege principles and network segmentation to limit the impact of any successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T07:02:51.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692fa033619fec35b4509f22

Added to database: 12/3/2025, 2:28:03 AM

Last enriched: 2/27/2026, 10:06:45 AM

Last updated: 3/22/2026, 1:35:36 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses