CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.
AI Analysis
Technical Summary
CVE-2025-13891 is a path traversal vulnerability classified under CWE-22 found in the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. The vulnerability resides in the modula_list_folders AJAX endpoint, which is designed to list directories for the plugin's gallery functionality. While the endpoint enforces user capability checks requiring at least Author-level permissions with upload_files and edit_posts rights, it lacks proper validation to ensure that user-supplied directory paths remain within intended base directories. This improper limitation allows authenticated attackers to manipulate the directory path parameter to traverse outside the allowed directory scope and enumerate arbitrary directories on the server. Such enumeration can expose sensitive files, configuration data, or other information that could facilitate further attacks. The vulnerability affects all plugin versions up to and including 2.13.3. The CVSS v3.1 base score is 6.5, indicating a medium severity with a vector of AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning network attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. No public exploits are known at this time, but the vulnerability poses a risk of information disclosure to authenticated users with Author or higher roles. The lack of proper path validation is a common security oversight in web applications, especially in plugins handling file system operations. This vulnerability underscores the importance of strict input validation and directory access controls in web plugins.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive server-side information, including configuration files, user data, or other protected resources stored on the web server. Since the vulnerability requires authenticated access with Author-level permissions, the risk is primarily from insider threats or compromised user accounts. However, many WordPress sites allow multiple users with Author or Editor roles, increasing the attack surface. Disclosure of sensitive information can facilitate further attacks such as privilege escalation, data theft, or targeted exploitation of other vulnerabilities. Organizations relying on this plugin for public-facing websites or intranet portals may face reputational damage, compliance issues under GDPR due to data exposure, and operational risks. The medium severity rating reflects the balance between required privileges and the high confidentiality impact. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability has the potential to affect a significant number of sites if unpatched. Attackers could leverage this flaw to map server directories and identify valuable targets for subsequent attacks.
Mitigation Recommendations
1. Immediately restrict plugin usage to trusted users with minimal necessary permissions; consider limiting Author-level access to only essential personnel. 2. Monitor web server and WordPress logs for unusual access patterns to the modula_list_folders AJAX endpoint, especially directory enumeration attempts. 3. Implement web application firewall (WAF) rules to detect and block suspicious path traversal payloads targeting the affected endpoint. 4. If possible, disable or remove the 'Image Gallery – Photo Grid & Video Gallery' plugin until a security patch is released. 5. Follow wpchill’s official channels for updates and apply patches promptly once available. 6. Conduct a permissions audit on WordPress user roles to ensure no excessive privileges are granted unnecessarily. 7. Employ file system access controls on the server to restrict the web server user’s ability to read sensitive directories outside the web root. 8. Educate site administrators about the risks of granting Author-level access and encourage strong authentication mechanisms such as MFA to reduce account compromise risk.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
Description
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-13891 is a path traversal vulnerability classified under CWE-22 found in the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. The vulnerability resides in the modula_list_folders AJAX endpoint, which is designed to list directories for the plugin's gallery functionality. While the endpoint enforces user capability checks requiring at least Author-level permissions with upload_files and edit_posts rights, it lacks proper validation to ensure that user-supplied directory paths remain within intended base directories. This improper limitation allows authenticated attackers to manipulate the directory path parameter to traverse outside the allowed directory scope and enumerate arbitrary directories on the server. Such enumeration can expose sensitive files, configuration data, or other information that could facilitate further attacks. The vulnerability affects all plugin versions up to and including 2.13.3. The CVSS v3.1 base score is 6.5, indicating a medium severity with a vector of AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning network attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. No public exploits are known at this time, but the vulnerability poses a risk of information disclosure to authenticated users with Author or higher roles. The lack of proper path validation is a common security oversight in web applications, especially in plugins handling file system operations. This vulnerability underscores the importance of strict input validation and directory access controls in web plugins.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive server-side information, including configuration files, user data, or other protected resources stored on the web server. Since the vulnerability requires authenticated access with Author-level permissions, the risk is primarily from insider threats or compromised user accounts. However, many WordPress sites allow multiple users with Author or Editor roles, increasing the attack surface. Disclosure of sensitive information can facilitate further attacks such as privilege escalation, data theft, or targeted exploitation of other vulnerabilities. Organizations relying on this plugin for public-facing websites or intranet portals may face reputational damage, compliance issues under GDPR due to data exposure, and operational risks. The medium severity rating reflects the balance between required privileges and the high confidentiality impact. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability has the potential to affect a significant number of sites if unpatched. Attackers could leverage this flaw to map server directories and identify valuable targets for subsequent attacks.
Mitigation Recommendations
1. Immediately restrict plugin usage to trusted users with minimal necessary permissions; consider limiting Author-level access to only essential personnel. 2. Monitor web server and WordPress logs for unusual access patterns to the modula_list_folders AJAX endpoint, especially directory enumeration attempts. 3. Implement web application firewall (WAF) rules to detect and block suspicious path traversal payloads targeting the affected endpoint. 4. If possible, disable or remove the 'Image Gallery – Photo Grid & Video Gallery' plugin until a security patch is released. 5. Follow wpchill’s official channels for updates and apply patches promptly once available. 6. Conduct a permissions audit on WordPress user roles to ensure no excessive privileges are granted unnecessarily. 7. Employ file system access controls on the server to restrict the web server user’s ability to read sensitive directories outside the web root. 8. Educate site administrators about the risks of granting Author-level access and encourage strong authentication mechanisms such as MFA to reduce account compromise risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T15:32:55.502Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693bc3e35f3fdafda42e6cdc
Added to database: 12/12/2025, 7:27:31 AM
Last enriched: 12/19/2025, 8:27:42 AM
Last updated: 2/7/2026, 9:44:58 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.