Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High3
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2025-12-15

CVE-2025-13646 - Modula Image Gallery Plugin

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files with race condition on the affected site's server which may make remote code execution possible.

PLUGIN Modula Image Gallery

CVE-2025-13646

HIGH CVSS 7.5 2025-12-03
Threat Entry Updated 2025-12-15

CVE-2025-13645 - Modula Image Gallery Plugin

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Modula Image Gallery

CVE-2025-13645

HIGH CVSS 7.2 2025-12-03
Threat Entry Updated 2025-12-15

CVE-2024-12853 - Modula Image Gallery Plugin

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zip upload functionality in all versions up to, and including, 2.11.10. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Modula Image Gallery

CVE-2024-12853

HIGH CVSS 8.8 2025-01-08
Scroll to top