Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery

0
Medium
VulnerabilityCVE-2025-13891cvecve-2025-13891cwe-22
Published: Fri Dec 12 2025 (12/12/2025, 07:20:35 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.

AI-Powered Analysis

AILast updated: 12/19/2025, 08:27:42 UTC

Technical Analysis

CVE-2025-13891 is a path traversal vulnerability classified under CWE-22 found in the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. The vulnerability resides in the modula_list_folders AJAX endpoint, which is designed to list directories for the plugin's gallery functionality. While the endpoint enforces user capability checks requiring at least Author-level permissions with upload_files and edit_posts rights, it lacks proper validation to ensure that user-supplied directory paths remain within intended base directories. This improper limitation allows authenticated attackers to manipulate the directory path parameter to traverse outside the allowed directory scope and enumerate arbitrary directories on the server. Such enumeration can expose sensitive files, configuration data, or other information that could facilitate further attacks. The vulnerability affects all plugin versions up to and including 2.13.3. The CVSS v3.1 base score is 6.5, indicating a medium severity with a vector of AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning network attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. No public exploits are known at this time, but the vulnerability poses a risk of information disclosure to authenticated users with Author or higher roles. The lack of proper path validation is a common security oversight in web applications, especially in plugins handling file system operations. This vulnerability underscores the importance of strict input validation and directory access controls in web plugins.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive server-side information, including configuration files, user data, or other protected resources stored on the web server. Since the vulnerability requires authenticated access with Author-level permissions, the risk is primarily from insider threats or compromised user accounts. However, many WordPress sites allow multiple users with Author or Editor roles, increasing the attack surface. Disclosure of sensitive information can facilitate further attacks such as privilege escalation, data theft, or targeted exploitation of other vulnerabilities. Organizations relying on this plugin for public-facing websites or intranet portals may face reputational damage, compliance issues under GDPR due to data exposure, and operational risks. The medium severity rating reflects the balance between required privileges and the high confidentiality impact. Given the widespread use of WordPress across Europe, especially in SMEs and public sector websites, the vulnerability has the potential to affect a significant number of sites if unpatched. Attackers could leverage this flaw to map server directories and identify valuable targets for subsequent attacks.

Mitigation Recommendations

1. Immediately restrict plugin usage to trusted users with minimal necessary permissions; consider limiting Author-level access to only essential personnel. 2. Monitor web server and WordPress logs for unusual access patterns to the modula_list_folders AJAX endpoint, especially directory enumeration attempts. 3. Implement web application firewall (WAF) rules to detect and block suspicious path traversal payloads targeting the affected endpoint. 4. If possible, disable or remove the 'Image Gallery – Photo Grid & Video Gallery' plugin until a security patch is released. 5. Follow wpchill’s official channels for updates and apply patches promptly once available. 6. Conduct a permissions audit on WordPress user roles to ensure no excessive privileges are granted unnecessarily. 7. Employ file system access controls on the server to restrict the web server user’s ability to read sensitive directories outside the web root. 8. Educate site administrators about the risks of granting Author-level access and encourage strong authentication mechanisms such as MFA to reduce account compromise risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-02T15:32:55.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bc3e35f3fdafda42e6cdc

Added to database: 12/12/2025, 7:27:31 AM

Last enriched: 12/19/2025, 8:27:42 AM

Last updated: 2/7/2026, 9:44:58 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats