CVE-2025-13645 PUBLISHED

Modula 2.13.1 - 2.13.2 - Authenticated (Author+) Arbitrary File Deletion

Assigner: Wordfence
Reserved: 25.11.2025 Published: 03.12.2025 Updated: 03.12.2025

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor wpchill
Product Image Gallery – Photo Grid & Video Gallery
Versions Default: unaffected
  • affected from 2.13.1 to 2.13.2 (incl.)

Credits

  • ISMAILSHADOW finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE