CVE-2025-11448: CWE-862 Missing Authorization in smub Gallery Plugin for WordPress – Envira Photo Gallery
The Gallery Plugin for WordPress – Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/envira-convert/v1/bulk-convert' REST API endpoint in all versions up to, and including, 1.11.0. This makes it possible for authenticated attackers, with contributor-level access and above, to convert galleries to Envira galleries.
AI Analysis
Technical Summary
CVE-2025-11448 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Envira Photo Gallery plugin for WordPress, developed by smub. The vulnerability exists in the REST API endpoint '/envira-convert/v1/bulk-convert', which lacks proper capability checks. This allows authenticated users with contributor-level privileges or higher to convert galleries to Envira galleries without the necessary authorization. The plugin versions up to and including 1.11.0 are affected. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS v3.1 score is 4.3, indicating medium severity, primarily due to the limited impact on confidentiality (none) and availability (none), but with a potential impact on data integrity (unauthorized modification). The flaw could be leveraged by malicious insiders or compromised contributor accounts to alter gallery content, potentially leading to misinformation or defacement. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The issue highlights the importance of enforcing strict authorization checks on REST API endpoints in WordPress plugins, especially those managing content modifications.
Potential Impact
For European organizations, the impact of CVE-2025-11448 centers on the integrity of web content managed via WordPress sites using the Envira Photo Gallery plugin. Unauthorized gallery conversions could lead to altered or misleading visual content, damaging brand reputation or user trust. Organizations relying on contributor-level users to manage content are at risk if those accounts are compromised or misused. While the vulnerability does not expose sensitive data or disrupt service availability, the integrity breach could facilitate further social engineering or phishing campaigns if attackers manipulate gallery content. This risk is particularly relevant for media companies, e-commerce platforms, educational institutions, and cultural organizations that use WordPress extensively for content delivery. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a widely used plugin necessitates proactive mitigation to prevent potential abuse.
Mitigation Recommendations
1. Immediately audit user roles and permissions to ensure only trusted users have contributor-level or higher access. 2. Restrict or monitor access to the REST API endpoints, especially '/envira-convert/v1/bulk-convert', using web application firewalls (WAF) or custom rules to detect anomalous usage. 3. Implement logging and alerting on REST API calls related to gallery conversions to identify suspicious activity. 4. Disable or remove the Envira Photo Gallery plugin if it is not essential to reduce attack surface. 5. Stay informed about vendor updates and apply patches promptly once released. 6. Consider using security plugins that enforce granular capability checks on REST API endpoints. 7. Educate content contributors about the risks of account compromise and enforce strong authentication mechanisms, such as MFA. 8. Regularly back up WordPress content and galleries to enable restoration in case of unauthorized modifications.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-11448: CWE-862 Missing Authorization in smub Gallery Plugin for WordPress – Envira Photo Gallery
Description
The Gallery Plugin for WordPress – Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/envira-convert/v1/bulk-convert' REST API endpoint in all versions up to, and including, 1.11.0. This makes it possible for authenticated attackers, with contributor-level access and above, to convert galleries to Envira galleries.
AI-Powered Analysis
Technical Analysis
CVE-2025-11448 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Envira Photo Gallery plugin for WordPress, developed by smub. The vulnerability exists in the REST API endpoint '/envira-convert/v1/bulk-convert', which lacks proper capability checks. This allows authenticated users with contributor-level privileges or higher to convert galleries to Envira galleries without the necessary authorization. The plugin versions up to and including 1.11.0 are affected. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS v3.1 score is 4.3, indicating medium severity, primarily due to the limited impact on confidentiality (none) and availability (none), but with a potential impact on data integrity (unauthorized modification). The flaw could be leveraged by malicious insiders or compromised contributor accounts to alter gallery content, potentially leading to misinformation or defacement. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The issue highlights the importance of enforcing strict authorization checks on REST API endpoints in WordPress plugins, especially those managing content modifications.
Potential Impact
For European organizations, the impact of CVE-2025-11448 centers on the integrity of web content managed via WordPress sites using the Envira Photo Gallery plugin. Unauthorized gallery conversions could lead to altered or misleading visual content, damaging brand reputation or user trust. Organizations relying on contributor-level users to manage content are at risk if those accounts are compromised or misused. While the vulnerability does not expose sensitive data or disrupt service availability, the integrity breach could facilitate further social engineering or phishing campaigns if attackers manipulate gallery content. This risk is particularly relevant for media companies, e-commerce platforms, educational institutions, and cultural organizations that use WordPress extensively for content delivery. The absence of known exploits reduces immediate risk, but the vulnerability's presence in a widely used plugin necessitates proactive mitigation to prevent potential abuse.
Mitigation Recommendations
1. Immediately audit user roles and permissions to ensure only trusted users have contributor-level or higher access. 2. Restrict or monitor access to the REST API endpoints, especially '/envira-convert/v1/bulk-convert', using web application firewalls (WAF) or custom rules to detect anomalous usage. 3. Implement logging and alerting on REST API calls related to gallery conversions to identify suspicious activity. 4. Disable or remove the Envira Photo Gallery plugin if it is not essential to reduce attack surface. 5. Stay informed about vendor updates and apply patches promptly once released. 6. Consider using security plugins that enforce granular capability checks on REST API endpoints. 7. Educate content contributors about the risks of account compromise and enforce strong authentication mechanisms, such as MFA. 8. Regularly back up WordPress content and galleries to enable restoration in case of unauthorized modifications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-07T16:31:27.084Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690f0e9f15ddfe7d54073e84
Added to database: 11/8/2025, 9:34:23 AM
Last enriched: 11/15/2025, 9:57:01 AM
Last updated: 12/24/2025, 12:39:55 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.