This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unrestricted File Upload in WP Load Gallery. π₯ **Consequences**: Attackers upload dangerous files (e.g., Web Shells) to the server.β¦
π‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The plugin fails to validate file types or extensions during upload.β¦
π¦ **Affected**: **WP Load Gallery** plugin. π **Versions**: **2.1.6 and earlier**. π’ **Vendor**: ngocuct0912. Any WordPress site running this plugin version is vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: With **Author+ privileges**, hackers can upload Web Shells. This grants **Full Server Control (RCE)**. They can steal databases, deface the site, or use it as a pivot for further attacks.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Threshold**: **Medium**. Requires **Authentication** (Author role or higher). It is not fully unauthenticated, but 'Author' is a common role for content contributors, making it accessible to many users.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π£ **Public Exploit**: **YES**. A PoC is available on GitHub (`Nxploited/CVE-2025-23942-poc`). Wild exploitation is likely as the attack vector is straightforward for authenticated users.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check WordPress Plugins list for 'WP Load Gallery'. 2. Verify version is **β€ 2.1.6**. 3. Scan for unauthorized PHP files in upload directories. 4.β¦
π« **Official Patch**: **NO**. The data indicates 'No official patch available' as of the publication date. You must rely on manual mitigation or version rollback if a newer safe version exists.
Q9What if no patch? (Workaround)
π οΈ **Workaround**: 1. **Deactivate/Uninstall** the plugin immediately if not essential. 2. Restrict file upload permissions via `.htaccess` or server config. 3.β¦
π₯ **Urgency**: **CRITICAL**. Despite requiring auth, the impact is **RCE**. CVSS 9.1 is severe. Patch immediately by removing the plugin or applying strict upload restrictions. Do not ignore this!