CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13891 affects the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. This plugin, widely used for managing photo and video galleries, contains a path traversal flaw in its modula_list_folders AJAX endpoint. The root cause is the lack of proper validation and restriction on user-supplied directory paths, allowing authenticated users with Author-level permissions or higher (who have upload_files and edit_posts capabilities) to enumerate arbitrary directories on the server. This means an attacker can craft requests to traverse outside the intended base directory and access directory listings that should be restricted. Although the endpoint checks user capabilities, it does not ensure that the requested paths are confined within safe directories, violating CWE-22 standards. The vulnerability does not require user interaction beyond authentication and does not allow direct modification or execution of files, but it exposes potentially sensitive information about the server's file structure. The CVSS 3.1 score of 6.5 reflects a medium severity, with high confidentiality impact but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability could be leveraged as a reconnaissance step for further attacks such as privilege escalation or targeted exploitation of exposed files. The issue affects all plugin versions up to and including 2.13.3, and no official patches have been linked yet. The vulnerability was published on December 12, 2025, and was reserved earlier on December 2, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk of information disclosure. Attackers with Author-level access can enumerate directories, potentially revealing sensitive files such as configuration files, backups, or other data that could facilitate further compromise. This is particularly concerning for organizations that host sensitive or regulated data on WordPress sites, including government agencies, financial institutions, and healthcare providers. The exposure of directory structures can aid attackers in crafting targeted attacks, including privilege escalation or lateral movement within the network. While the vulnerability does not directly allow code execution or denial of service, the confidentiality breach can have cascading effects on organizational security posture. Additionally, organizations with multiple content authors or contributors who have Author-level permissions increase the attack surface. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Compliance with GDPR and other data protection regulations may be impacted if sensitive data is exposed, leading to potential legal and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the vulnerable 'Image Gallery – Photo Grid & Video Gallery' plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack vector. Limit the number of users with Author-level or higher permissions, enforcing the principle of least privilege. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the modula_list_folders AJAX endpoint, especially those containing directory traversal patterns such as '../'. Conduct thorough logging and monitoring of AJAX requests to identify potential exploitation attempts. Review and harden file system permissions on the server to restrict access to sensitive directories, ensuring that even if directory enumeration occurs, sensitive files remain inaccessible. Once a patch is available, apply it promptly and verify that proper path validation and base directory restrictions are enforced. Additionally, educate content authors and administrators about the risks of elevated permissions and encourage strong authentication practices to reduce the likelihood of compromised accounts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13891: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
Description
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13891 affects the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. This plugin, widely used for managing photo and video galleries, contains a path traversal flaw in its modula_list_folders AJAX endpoint. The root cause is the lack of proper validation and restriction on user-supplied directory paths, allowing authenticated users with Author-level permissions or higher (who have upload_files and edit_posts capabilities) to enumerate arbitrary directories on the server. This means an attacker can craft requests to traverse outside the intended base directory and access directory listings that should be restricted. Although the endpoint checks user capabilities, it does not ensure that the requested paths are confined within safe directories, violating CWE-22 standards. The vulnerability does not require user interaction beyond authentication and does not allow direct modification or execution of files, but it exposes potentially sensitive information about the server's file structure. The CVSS 3.1 score of 6.5 reflects a medium severity, with high confidentiality impact but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability could be leveraged as a reconnaissance step for further attacks such as privilege escalation or targeted exploitation of exposed files. The issue affects all plugin versions up to and including 2.13.3, and no official patches have been linked yet. The vulnerability was published on December 12, 2025, and was reserved earlier on December 2, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk of information disclosure. Attackers with Author-level access can enumerate directories, potentially revealing sensitive files such as configuration files, backups, or other data that could facilitate further compromise. This is particularly concerning for organizations that host sensitive or regulated data on WordPress sites, including government agencies, financial institutions, and healthcare providers. The exposure of directory structures can aid attackers in crafting targeted attacks, including privilege escalation or lateral movement within the network. While the vulnerability does not directly allow code execution or denial of service, the confidentiality breach can have cascading effects on organizational security posture. Additionally, organizations with multiple content authors or contributors who have Author-level permissions increase the attack surface. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed. Compliance with GDPR and other data protection regulations may be impacted if sensitive data is exposed, leading to potential legal and reputational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the vulnerable 'Image Gallery – Photo Grid & Video Gallery' plugin and verify the version in use. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack vector. Limit the number of users with Author-level or higher permissions, enforcing the principle of least privilege. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the modula_list_folders AJAX endpoint, especially those containing directory traversal patterns such as '../'. Conduct thorough logging and monitoring of AJAX requests to identify potential exploitation attempts. Review and harden file system permissions on the server to restrict access to sensitive directories, ensuring that even if directory enumeration occurs, sensitive files remain inaccessible. Once a patch is available, apply it promptly and verify that proper path validation and base directory restrictions are enforced. Additionally, educate content authors and administrators about the risks of elevated permissions and encourage strong authentication practices to reduce the likelihood of compromised accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T15:32:55.502Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693bc3e35f3fdafda42e6cdc
Added to database: 12/12/2025, 7:27:31 AM
Last enriched: 12/12/2025, 7:29:10 AM
Last updated: 12/12/2025, 10:57:51 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
MediumCVE-2025-12841: CWE-862 Missing Authorization in Bookit
HighCVE-2025-12835: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WooMulti
HighCVE-2025-40829: CWE-908: Use of Uninitialized Resource in Siemens Simcenter Femap
HighCVE-2025-58137: CWE-639 Authorization Bypass Through User-Controlled Key in Apache Software Foundation Apache Fineract
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.