Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery

0
Medium
VulnerabilityCVE-2025-13891cvecve-2025-13891cwe-22
Published: Fri Dec 12 2025 (12/12/2025, 07:20:35 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.

AI-Powered Analysis

AILast updated: 12/12/2025, 07:29:10 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13891 affects the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. This plugin, widely used for managing photo and video galleries, contains a path traversal flaw in its modula_list_folders AJAX endpoint. The root cause is the lack of proper validation and restriction on user-supplied directory paths, allowing authenticated users with Author-level permissions or higher (who have upload_files and edit_posts capabilities) to enumerate arbitrary directories on the server. This means an attacker can craft requests to traverse outside the intended base directory and access directory listings that should be restricted. Although the endpoint checks user capabilities, it does not ensure that the requested paths are confined within safe directories, violating CWE-22 standards. The vulnerability does not require user interaction beyond authentication and does not allow direct modification or execution of files, but it exposes potentially sensitive information about the server's file structure. The CVSS 3.1 score of 6.5 reflects a medium severity, with high confidentiality impact but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability could be leveraged as a reconnaissance step for further attacks such as privilege escalation or targeted exploitation of exposed files. The issue affects all plugin versions up to and including 2.13.3, and no official patches have been linked yet. The vulnerability was published on December 12, 2025, and was reserved earlier on December 2, 2025.

Potential Impact

For European organizations, this vulnerability poses a significant risk of information disclosure. Attackers with Author-level access can enumerate directories, potentially revealing sensitive files such as configuration files, backups, or other data that could facilitate further compromise. This is particularly concerning for organizations that host sensitive or regulated data on WordPress sites, including government agencies, financial institutions, and healthcare providers. The exposure of directory structures can aid attackers in crafting targeted attacks, including privilege escalation or lateral movement within the network. While the vulnerability does not directly allow code execution or denial of service, the confidentiality breach can have cascading effects on organizational security posture. Additionally, organizations with multiple content authors or contributors who have Author-level permissions increase the attack surface. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Compliance with GDPR and other data protection regulations may be impacted if sensitive data is exposed, leading to potential legal and reputational consequences.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the vulnerable 'Image Gallery – Photo Grid & Video Gallery' plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack vector. Limit the number of users with Author-level or higher permissions, enforcing the principle of least privilege. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the modula_list_folders AJAX endpoint, especially those containing directory traversal patterns such as '../'. Conduct thorough logging and monitoring of AJAX requests to identify potential exploitation attempts. Review and harden file system permissions on the server to restrict access to sensitive directories, ensuring that even if directory enumeration occurs, sensitive files remain inaccessible. Once a patch is available, apply it promptly and verify that proper path validation and base directory restrictions are enforced. Additionally, educate content authors and administrators about the risks of elevated permissions and encourage strong authentication practices to reduce the likelihood of compromised accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-02T15:32:55.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bc3e35f3fdafda42e6cdc

Added to database: 12/12/2025, 7:27:31 AM

Last enriched: 12/12/2025, 7:29:10 AM

Last updated: 12/12/2025, 10:57:51 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats