Description
The PostGallery plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'PostGalleryUploader' class functions in all versions up to, and including, 1.12.5. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-12-04
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: arbitrary file upload leading to potential remote code execution
Action: Immediate Patch
AI Analysis

Impact

The PostGallery plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the PostGalleryUploader class in all versions up to and including 1.12.5. The flaw allows authenticated users with subscriber level and above permissions to upload files that are not properly vetted. Because the uploaded file can be placed under a web‑accessible directory and may contain executable code, attackers could potentially gain remote code execution capabilities on the affected site. The weakness aligns with CWE-434: Unrestricted Upload of File with Dangerous Type.

Affected Systems

This vulnerability affects the rtowebsites PostGallery plugin for WordPress. All installed copies of the plugin with a version number of 1.12.5 or earlier are impacted. Sites using the 1.12.5 variant or older are therefore at risk.

Risk and Exploitability

The CVSS score of 8.8 classifies this flaw as High severity, and the EPSS score of less than 1% indicates a low likelihood of exploitation at present, though the vulnerability remains exploitable. The flaw is not listed in CISA KEV. Attackers must be authenticated and hold at least subscriber‑level privileges to use the upload interface. The likely attack path is to submit a malicious file through the plugin’s upload mechanism; because the file type is not validated, the server may store the file in a location that can be executed as a script, thereby enabling remote code execution.

Generated by OpenCVE AI on April 22, 2026 at 16:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PostGallery plugin to any version newer than 1.12.5 to remove the flaw.
  • Disable file uploads for subscriber and lower roles using a WordPress security or role‑management plugin so that the vulnerable interface is inaccessible to potential attackers.
  • Configure the web server or file system so that files uploaded through PostGallery are stored in a non‑executable directory and that PHP execution is disabled for that directory.

Generated by OpenCVE AI on April 22, 2026 at 16:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 04 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description The PostGallery plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'PostGalleryUploader' class functions in all versions up to, and including, 1.12.5. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title PostGallery <= 1.12.5 - Authenticated (Subscriber+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:36.404Z

Reserved: 2025-11-22T14:12:33.475Z

Link: CVE-2025-13543

cve-icon Vulnrichment

Updated: 2025-12-09T19:40:51.376Z

cve-icon NVD

Status : Deferred

Published: 2025-12-04T21:16:08.037

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13543

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:30:22Z

Weaknesses