CVE-2025-13646

7.5 HIGH

📋 TL;DR

The Modula Image Gallery WordPress plugin versions 2.13.1 to 2.13.2 contain a vulnerability that allows authenticated attackers with Author-level permissions or higher to upload arbitrary files due to missing file type validation. This can lead to remote code execution through race condition exploitation. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Modula Image Gallery WordPress plugin
Versions: 2.13.1 to 2.13.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with Author role or higher. WordPress multisite installations may be affected differently.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, malware deployment, or site defacement.

🟠

Likely Case

Unauthorized file upload leading to backdoor installation, privilege escalation, or data exfiltration.

🟢

If Mitigated

Limited impact if proper file upload restrictions and user role management are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires Author-level access and race condition timing. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.13.3

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3407949/modula-best-grid-gallery

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Modula Image Gallery. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.13.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily limit Author and higher role assignments to trusted users only.

Disable Plugin

linux

Deactivate Modula Image Gallery plugin until patched.

wp plugin deactivate modula-best-grid-gallery

🧯 If You Can't Patch

  • Implement strict file upload validation at web server level (e.g., .htaccess restrictions)
  • Monitor and audit user accounts with Author role or higher for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Modula Image Gallery version. If version is 2.13.1 or 2.13.2, system is vulnerable.

Check Version:

wp plugin get modula-best-grid-gallery --field=version

Verify Fix Applied:

Confirm plugin version is 2.13.3 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via /wp-admin/admin-ajax.php with action=modula_unzip_file
  • PHP file uploads in uploads/modula folder

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with file upload parameters

SIEM Query:

source="wordpress.log" AND "modula_unzip_file" AND ("php" OR "exe" OR "sh")

🔗 References

📤 Share & Export