WordPress Plugin Vulnerabilities
NextGEN Gallery < 4.0.0 - Contributor+ Local File Inclusion via 'template'
Description
The plugin is vulnerable to Local File Inclusion via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.
Affects Plugins
References
Classification
Type
LFI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Athiwat Tiprasaharn (Jitlada)
Verified
No
WPVDB ID
Timeline
Publicly Published
2025-12-17 (about 4 months ago)
Added
2025-12-18 (about 4 months ago)
Last Updated
2025-12-18 (about 4 months ago)