Description

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

INFO

Published Date :

2025-12-03T02:25:28.863Z

Last Modified :

2025-12-03T21:08:20.205Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2025-13645 vulnerability.

Vendors Products
Wordpress
  • Wordpress
Wpchill
  • Image Gallery
  • Modula Image Gallery

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact