CVE-2025-13645

Source
https://cve.org/CVERecord?id=CVE-2025-13645
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13645.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-13645
Published
2025-12-03T03:15:59.840Z
Modified
2026-03-15T22:50:17.200635Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajaxunzipfile' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "2.13.1"
            },
            {
                "fixed": "2.13.3"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13645.json"