CVE-2025-12494: CWE-285 Improper Authorization in wpchill Image Gallery – Photo Grid & Video Gallery
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajax_import_file function in all versions up to, and including, 2.12.28. This makes it possible for authenticated attackers, with author-level access and above, to move arbitrary image files on the server.
AI Analysis
Technical Summary
CVE-2025-12494 is an improper authorization vulnerability categorized under CWE-285 found in the WordPress plugin 'Image Gallery – Photo Grid & Video Gallery' developed by wpchill. The flaw exists in the ajax_import_file function, which fails to properly validate file paths before performing file operations. This allows authenticated users with author-level access or higher to delete arbitrary image files on the server by manipulating the file path parameters. The vulnerability affects all plugin versions up to and including 2.12.28. The attack vector is remote over the network (AV:N), requires low attack complexity (AC:L), and privileges at the author level (PR:L), with no user interaction needed (UI:N). The impact is limited to integrity (I:L) without affecting confidentiality or availability. Although no public exploits have been reported yet, the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors who have author-level permissions. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps. The vulnerability could be leveraged to remove or manipulate image files, potentially disrupting website content and damaging organizational reputation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of image files hosted on WordPress sites using the affected plugin. This compromises the integrity of website content, potentially causing disruption to marketing, e-commerce, or informational portals. While it does not directly expose sensitive data or cause denial of service, the ability to delete arbitrary files could be exploited to remove critical media assets, degrade user experience, or facilitate further attacks by removing security-related files. Organizations with collaborative content management environments are particularly at risk due to the requirement of author-level access. The reputational damage and operational disruption could be significant for businesses relying heavily on their web presence. Additionally, the absence of a patch increases exposure time, necessitating proactive defense measures.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within WordPress, ensuring that author-level access is granted only to trusted users. Implement strict access controls and monitor file system changes for unauthorized deletions or modifications. Disable or uninstall the vulnerable plugin if possible until a patch is released. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious ajax_import_file requests. Regularly back up website content, including media files, to enable rapid recovery in case of file deletion. Stay informed about updates from the plugin vendor and apply patches promptly once available. Consider isolating WordPress instances or running them in containerized environments to limit the impact of potential exploitation. Finally, conduct security awareness training for content contributors to recognize and report unusual behavior.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12494: CWE-285 Improper Authorization in wpchill Image Gallery – Photo Grid & Video Gallery
Description
The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajax_import_file function in all versions up to, and including, 2.12.28. This makes it possible for authenticated attackers, with author-level access and above, to move arbitrary image files on the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-12494 is an improper authorization vulnerability categorized under CWE-285 found in the WordPress plugin 'Image Gallery – Photo Grid & Video Gallery' developed by wpchill. The flaw exists in the ajax_import_file function, which fails to properly validate file paths before performing file operations. This allows authenticated users with author-level access or higher to delete arbitrary image files on the server by manipulating the file path parameters. The vulnerability affects all plugin versions up to and including 2.12.28. The attack vector is remote over the network (AV:N), requires low attack complexity (AC:L), and privileges at the author level (PR:L), with no user interaction needed (UI:N). The impact is limited to integrity (I:L) without affecting confidentiality or availability. Although no public exploits have been reported yet, the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple contributors who have author-level permissions. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps. The vulnerability could be leveraged to remove or manipulate image files, potentially disrupting website content and damaging organizational reputation.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of image files hosted on WordPress sites using the affected plugin. This compromises the integrity of website content, potentially causing disruption to marketing, e-commerce, or informational portals. While it does not directly expose sensitive data or cause denial of service, the ability to delete arbitrary files could be exploited to remove critical media assets, degrade user experience, or facilitate further attacks by removing security-related files. Organizations with collaborative content management environments are particularly at risk due to the requirement of author-level access. The reputational damage and operational disruption could be significant for businesses relying heavily on their web presence. Additionally, the absence of a patch increases exposure time, necessitating proactive defense measures.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within WordPress, ensuring that author-level access is granted only to trusted users. Implement strict access controls and monitor file system changes for unauthorized deletions or modifications. Disable or uninstall the vulnerable plugin if possible until a patch is released. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious ajax_import_file requests. Regularly back up website content, including media files, to enable rapid recovery in case of file deletion. Stay informed about updates from the plugin vendor and apply patches promptly once available. Consider isolating WordPress instances or running them in containerized environments to limit the impact of potential exploitation. Finally, conduct security awareness training for content contributors to recognize and report unusual behavior.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-29T20:58:17.650Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6918143b93cc35e7aa3af0e2
Added to database: 11/15/2025, 5:48:43 AM
Last enriched: 11/22/2025, 8:30:51 AM
Last updated: 1/7/2026, 8:45:59 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.