Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11448: CWE-862 Missing Authorization in smub Gallery Plugin for WordPress – Envira Photo Gallery

0
Medium
VulnerabilityCVE-2025-11448cvecve-2025-11448cwe-862
Published: Sat Nov 08 2025 (11/08/2025, 09:28:11 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Gallery Plugin for WordPress – Envira Photo Gallery

Description

The Gallery Plugin for WordPress – Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/envira-convert/v1/bulk-convert' REST API endpoint in all versions up to, and including, 1.11.0. This makes it possible for authenticated attackers, with contributor-level access and above, to convert galleries to Envira galleries.

AI-Powered Analysis

AILast updated: 11/15/2025, 09:57:01 UTC

Technical Analysis

CVE-2025-11448 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Envira Photo Gallery plugin for WordPress, developed by smub. The vulnerability exists in the REST API endpoint '/envira-convert/v1/bulk-convert', which lacks proper capability checks. This allows authenticated users with contributor-level privileges or higher to convert galleries to Envira galleries without the necessary authorization. The plugin versions up to and including 1.11.0 are affected. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS v3.1 score is 4.3, indicating medium severity, primarily due to the limited impact on confidentiality (none) and availability (none), but with a potential impact on data integrity (unauthorized modification). The flaw could be leveraged by malicious insiders or compromised contributor accounts to alter gallery content, potentially leading to misinformation or defacement. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The issue highlights the importance of enforcing strict authorization checks on REST API endpoints in WordPress plugins, especially those managing content modifications.

Potential Impact

For European organizations, the impact of CVE-2025-11448 centers on the integrity of web content managed via WordPress sites using the Envira Photo Gallery plugin. Unauthorized gallery conversions could lead to altered or misleading visual content, damaging brand reputation or user trust. Organizations relying on contributor-level users to manage content are at risk if those accounts are compromised or misused. While the vulnerability does not expose sensitive data or disrupt service availability, the integrity breach could facilitate further social engineering or phishing campaigns if attackers manipulate gallery content. This risk is particularly relevant for media companies, e-commerce platforms, educational institutions, and cultural organizations that use WordPress extensively for content delivery. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a widely used plugin necessitates proactive mitigation to prevent potential abuse.

Mitigation Recommendations

1. Immediately audit user roles and permissions to ensure only trusted users have contributor-level or higher access. 2. Restrict or monitor access to the REST API endpoints, especially '/envira-convert/v1/bulk-convert', using web application firewalls (WAF) or custom rules to detect anomalous usage. 3. Implement logging and alerting on REST API calls related to gallery conversions to identify suspicious activity. 4. Disable or remove the Envira Photo Gallery plugin if it is not essential to reduce attack surface. 5. Stay informed about vendor updates and apply patches promptly once released. 6. Consider using security plugins that enforce granular capability checks on REST API endpoints. 7. Educate content contributors about the risks of account compromise and enforce strong authentication mechanisms, such as MFA. 8. Regularly back up WordPress content and galleries to enable restoration in case of unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-07T16:31:27.084Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690f0e9f15ddfe7d54073e84

Added to database: 11/8/2025, 9:34:23 AM

Last enriched: 11/15/2025, 9:57:01 AM

Last updated: 12/24/2025, 12:39:55 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats