Description
The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.5.7. This is due to insufficient file type validation detecting VTT files, allowing double extension files to bypass sanitization while being accepted as a valid VTT file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2026-01-16
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Upload with potential Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The All‑In‑One Video Gallery plugin for WordPress suffers from insufficient file type validation during VTT uploads. A double extension technique allows an authenticated user with author or higher privileges to upload files that bypass the VTT sanitization and are stored on the server. This flaw can be used to place malicious scripts or other executable files, potentially leading to remote code execution if the attacker can subsequently invoke the uploaded file.

Affected Systems

The vulnerability affects the plugins360 All‑In‑One Video Gallery product on WordPress. All released versions up to and including 4.5.7 are vulnerable. Sites running any of these versions with users who have author‑level access or higher are at risk.

Risk and Exploitability

The flaw carries a CVSS score of 8.8, indicating high severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and it is not listed in the CISA KEV catalog. Nevertheless, the exploit requires only authenticated author access, which is common on many sites, and the flaw can lead to file upload that may enable remote code execution if the server permits execution of uploaded files.

Generated by OpenCVE AI on April 21, 2026 at 00:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the All‑In‑One Video Gallery plugin to the latest available version (≥4.5.8).
  • Revoke or restrict author‑level permissions on the affected sites unless strictly needed.
  • Move the plugin’s upload directory outside the web‑root or apply restrictive permissions to prevent execution of uploaded files.
  • Enable logging and regularly scan the upload directory for unexpected files.

Generated by OpenCVE AI on April 21, 2026 at 00:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Plugins360
Plugins360 all-in-one Video Gallery
Wordpress
Wordpress wordpress
Vendors & Products Plugins360
Plugins360 all-in-one Video Gallery
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.5.7. This is due to insufficient file type validation detecting VTT files, allowing double extension files to bypass sanitization while being accepted as a valid VTT file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title All-in-One Video Gallery <= 4.5.7 - Authenticated (Author+) Arbitrary File Upload via VTT Upload Bypass
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Plugins360 All-in-one Video Gallery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:08.004Z

Reserved: 2025-11-10T15:26:13.171Z

Link: CVE-2025-12957

cve-icon Vulnrichment

Updated: 2026-01-16T14:01:36.233Z

cve-icon NVD

Status : Deferred

Published: 2026-01-16T05:16:08.300

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:30:22Z

Weaknesses