Home

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajax_import_file function in all versions up to, and including, 2.12.28. This makes it possible for authenticated attackers, with author-level access and above, to move arbitrary image files on the server.

PUBLISHED Reserved 2025-10-29 | Published 2025-11-15 | Updated 2025-11-17 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-285 Improper Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-06:Vendor Notified
2025-11-14:Disclosed

Credits

Dmitrii Ignatyev finder

References

www.wordfence.com/...-d8bd-46a4-9e88-9534d9c60b4a?source=cve

plugins.trac.wordpress.org/...lass-modula-gallery-upload.php

plugins.trac.wordpress.org/...lass-modula-gallery-upload.php

plugins.trac.wordpress.org/...lass-modula-gallery-upload.php

plugins.trac.wordpress.org/...lass-modula-gallery-upload.php

research.cleantalk.org/cve-2025-12494/

plugins.trac.wordpress.org/...dula-best-grid-gallery%2Ftrunk

cve.org (CVE-2025-12494)

nvd.nist.gov (CVE-2025-12494)

Download JSON