Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12494: CWE-285 Improper Authorization in wpchill Image Gallery – Photo Grid & Video Gallery

0
Medium
VulnerabilityCVE-2025-12494cvecve-2025-12494cwe-285
Published: Sat Nov 15 2025 (11/15/2025, 05:45:34 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajax_import_file function in all versions up to, and including, 2.12.28. This makes it possible for authenticated attackers, with author-level access and above, to move arbitrary image files on the server.

AI-Powered Analysis

AILast updated: 11/15/2025, 05:52:42 UTC

Technical Analysis

CVE-2025-12494 is an authorization vulnerability categorized under CWE-285 that affects the 'Image Gallery – Photo Grid & Video Gallery' WordPress plugin developed by wpchill. The vulnerability exists in the ajax_import_file function, which fails to properly validate file paths before performing file operations. This flaw allows authenticated users with author-level privileges or higher to perform arbitrary file deletion or movement on the server hosting the WordPress site. Since author-level users typically have permissions to upload and manage content, this vulnerability escalates their ability to manipulate files beyond intended scope, potentially leading to data integrity issues or disruption of website content. The vulnerability is exploitable remotely over the network without requiring user interaction, increasing its risk profile. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope of impact (integrity only), the requirement for authenticated access, and the lack of impact on confidentiality or availability. No patches or updates are currently linked, and no known exploits have been reported in the wild. The vulnerability affects all versions up to and including 2.12.28 of the plugin. Given the widespread use of WordPress and this plugin for image galleries, the vulnerability poses a moderate risk to websites that rely on this plugin for media management.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized modification or deletion of image files hosted on WordPress sites using the affected plugin. This can disrupt website content, damage brand reputation, and potentially cause operational issues if critical media assets are lost or manipulated. While it does not directly expose sensitive data or cause denial of service, the integrity compromise can be leveraged as part of a broader attack chain, such as defacement or social engineering campaigns. Organizations with multiple content authors or contributors are at higher risk since the attack requires author-level access. Sectors relying heavily on web presence, including e-commerce, media, education, and government, may face increased exposure. The lack of known exploits reduces immediate risk, but the vulnerability's presence in a popular plugin means attackers could develop exploits, increasing future risk.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict author-level access strictly to trusted users and review user roles regularly to minimize the number of users with elevated privileges. 2) Monitor file system changes on web servers hosting WordPress sites, focusing on image directories managed by the plugin, to detect unauthorized file deletions or movements. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious ajax_import_file requests that attempt to manipulate file paths. 4) Isolate WordPress installations in segmented environments to limit lateral movement if exploitation occurs. 5) Regularly audit installed plugins and maintain an inventory to quickly identify vulnerable versions. 6) Engage with the plugin vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 7) Consider implementing file integrity monitoring solutions tailored for web content directories. These steps go beyond generic advice by focusing on access control, monitoring, and proactive patch management specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T20:58:17.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6918143b93cc35e7aa3af0e2

Added to database: 11/15/2025, 5:48:43 AM

Last enriched: 11/15/2025, 5:52:42 AM

Last updated: 11/19/2025, 2:24:37 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats