CVE-2025-13645

7.2 HIGH

📋 TL;DR

The Modula Image Gallery WordPress plugin versions 2.13.1 to 2.13.2 contain an arbitrary file deletion vulnerability due to insufficient file path validation. Authenticated attackers with Author-level permissions or higher can delete arbitrary files on the server, potentially leading to remote code execution by deleting critical files like wp-config.php. This affects WordPress sites using the vulnerable plugin versions.

💻 Affected Systems

Products:
  • Modula Image Gallery WordPress plugin
Versions: 2.13.1 to 2.13.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with Author role or higher. WordPress multisite installations may be affected differently.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through remote code execution by deleting wp-config.php or other critical files, leading to data loss, defacement, or server takeover.

🟠

Likely Case

Site disruption or data loss through deletion of important files, potentially causing downtime or requiring restoration from backups.

🟢

If Mitigated

Limited impact if proper access controls and file permissions are in place, restricting damage to non-critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Author-level WordPress credentials. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.13.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/modula-best-grid-gallery/tags/2.13.3

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Modula Image Gallery. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.13.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Modula Image Gallery plugin until patched.

wp plugin deactivate modula-best-grid-gallery

Restrict user roles

all

Temporarily remove Author and higher roles from untrusted users.

🧯 If You Can't Patch

  • Implement strict file permissions (e.g., chmod 644 for wp-config.php, restrict write access to web server user).
  • Monitor and audit user accounts with Author+ roles for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Modula Image Gallery → Version. If version is 2.13.1 or 2.13.2, system is vulnerable.

Check Version:

wp plugin get modula-best-grid-gallery --field=version

Verify Fix Applied:

Verify plugin version is 2.13.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in web server logs (e.g., POST requests to /wp-admin/admin-ajax.php with action=modula_unzip_file).
  • WordPress audit logs showing Author+ users accessing file management functions unexpectedly.

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with parameters targeting file deletion paths.

SIEM Query:

source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND (param="modula_unzip_file" OR param LIKE "%delete%")

🔗 References

📤 Share & Export