Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12081: CWE-862 Missing Authorization in navzme ACF Photo Gallery Field

0
Medium
VulnerabilityCVE-2025-12081cvecve-2025-12081cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 03:25:19 UTC)
Source: CVE Database V5
Vendor/Project: navzme
Product: ACF Photo Gallery Field

Description

The ACF Photo Gallery Field plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the "acf_photo_gallery_edit_save" function in all versions up to, and including, 3.0. This makes it possible for authenticated attackers, with subscriber level access and above, to modify the title, caption, and custom metadata of arbitrary media attachments.

AI-Powered Analysis

AILast updated: 02/19/2026, 04:30:32 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12081 affects the ACF Photo Gallery Field plugin developed by navzme for WordPress, specifically all versions up to and including 3.0. The root cause is a missing authorization check in the function acf_photo_gallery_edit_save, which is responsible for saving edits to photo gallery media attachments. Due to this missing capability check, any authenticated user with at least subscriber-level access can modify the title, caption, and custom metadata of arbitrary media attachments on the affected WordPress sites. This vulnerability falls under CWE-862 (Missing Authorization), indicating that the plugin fails to properly verify user permissions before allowing modifications. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that exploitation requires network access and low privileges but does not impact confidentiality or availability, only integrity. There is no requirement for user interaction beyond authentication, and no known exploits have been reported in the wild. The vulnerability could be leveraged to manipulate website content, potentially misleading users or damaging the credibility of the site. Since media attachments are often publicly visible, unauthorized changes could be used for defacement or misinformation. The lack of patches currently necessitates interim mitigations. The vulnerability was published on February 19, 2026, with the issue reserved in October 2025. The plugin is widely used in WordPress environments, making this a relevant concern for many organizations relying on WordPress for content management.

Potential Impact

For European organizations, the primary impact of CVE-2025-12081 is on the integrity of web content managed via WordPress sites using the ACF Photo Gallery Field plugin. Unauthorized modification of media metadata can lead to misinformation, brand damage, and loss of user trust. Although confidentiality and availability are not directly affected, the integrity compromise can have reputational and operational consequences, especially for media companies, e-commerce platforms, and public sector websites that rely heavily on accurate media presentation. Attackers with subscriber-level access could manipulate media metadata to mislead visitors or embed misleading information. This could also be a vector for social engineering or phishing if attackers alter media descriptions to include malicious links or false claims. The vulnerability does not allow remote unauthenticated exploitation, limiting the attack surface to users with some level of access, but subscriber accounts are common and often less monitored. Therefore, organizations with large user bases or weak user access controls are at higher risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit user roles and permissions in WordPress to ensure subscriber-level accounts have minimal privileges and are granted only when necessary. 2) Restrict the ability to upload or edit media attachments to trusted roles above subscriber level where possible. 3) Monitor media metadata changes closely using WordPress logging plugins or SIEM integrations to detect unauthorized modifications. 4) Employ web application firewalls (WAFs) with custom rules to detect anomalous requests targeting the acf_photo_gallery_edit_save function. 5) Educate site administrators and content managers to review media metadata regularly for suspicious changes. 6) Keep WordPress core and all plugins updated and subscribe to vendor advisories for prompt patch deployment once available. 7) Consider temporarily disabling or replacing the ACF Photo Gallery Field plugin if the risk is unacceptable and no patch is available. 8) Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-22T15:58:47.791Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69968d636aea4a407a3900c5

Added to database: 2/19/2026, 4:11:15 AM

Last enriched: 2/19/2026, 4:30:32 AM

Last updated: 2/21/2026, 12:18:07 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats