CVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
The Contest Gallery plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 28.0.2. This is due to the plugin registering the `cg_check_wp_admin_upload_v10` AJAX action for both authenticated and unauthenticated users without implementing capability checks or nonce verification. This makes it possible for unauthenticated attackers to inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata via the `cg_check_wp_admin_upload_v10` action. It does not enable an attacker to move or upload files.
AI Analysis
Technical Summary
CVE-2025-12849 is an authorization bypass vulnerability identified in the Contest Gallery – Upload, Vote & Sell with PayPal and Stripe WordPress plugin, affecting all versions up to and including 28.0.2. The root cause is the plugin's registration of the AJAX action 'cg_check_wp_admin_upload_v10' for both authenticated and unauthenticated users without enforcing capability checks or nonce verification, which are standard WordPress security mechanisms to validate user permissions and prevent CSRF attacks. This design flaw enables unauthenticated attackers to invoke this AJAX endpoint and inject arbitrary WordPress media attachments into galleries, as well as manipulate gallery metadata. Although attackers cannot upload new files or move existing files on the server, the ability to inject media attachments and alter metadata can lead to unauthorized content display, potential misinformation, or defacement of galleries. The vulnerability impacts the integrity of the affected WordPress sites but does not compromise confidentiality or availability directly. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the network attack vector, no privileges required, no user interaction needed, and limited impact confined to integrity. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is cataloged under CWE-862 (Missing Authorization).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of WordPress sites using the Contest Gallery plugin. Attackers could manipulate gallery content by injecting unauthorized media attachments or altering metadata, potentially damaging brand reputation, misleading users, or facilitating social engineering attacks. While it does not allow file uploads or server compromise, unauthorized content manipulation can undermine trust and may be leveraged as part of broader attack chains. Organizations in sectors relying heavily on public-facing WordPress galleries—such as media, e-commerce, cultural institutions, and event organizers—are particularly at risk. Additionally, GDPR considerations arise if manipulated galleries lead to misinformation or affect user data indirectly. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic attacks, especially on sites without timely updates or mitigations.
Mitigation Recommendations
Immediate mitigation steps include disabling or restricting access to the 'cg_check_wp_admin_upload_v10' AJAX action if possible, for example by implementing custom capability checks or nonce verification via WordPress hooks or firewall rules. Organizations should monitor web server logs for unusual AJAX requests targeting this action. Applying updates to the plugin once a patch is released is critical; until then, consider temporarily deactivating the Contest Gallery plugin if galleries are not essential or replacing it with alternative plugins that follow secure coding practices. Web Application Firewalls (WAFs) can be configured to block unauthenticated requests to this AJAX endpoint. Additionally, hardening WordPress installations by enforcing strict user roles and permissions, limiting plugin installations to trusted sources, and conducting regular security audits will reduce exposure. Backup and recovery plans should be reviewed to quickly restore any manipulated content. Finally, educating site administrators about this vulnerability and encouraging prompt patch management is essential.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
Description
The Contest Gallery plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 28.0.2. This is due to the plugin registering the `cg_check_wp_admin_upload_v10` AJAX action for both authenticated and unauthenticated users without implementing capability checks or nonce verification. This makes it possible for unauthenticated attackers to inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata via the `cg_check_wp_admin_upload_v10` action. It does not enable an attacker to move or upload files.
AI-Powered Analysis
Technical Analysis
CVE-2025-12849 is an authorization bypass vulnerability identified in the Contest Gallery – Upload, Vote & Sell with PayPal and Stripe WordPress plugin, affecting all versions up to and including 28.0.2. The root cause is the plugin's registration of the AJAX action 'cg_check_wp_admin_upload_v10' for both authenticated and unauthenticated users without enforcing capability checks or nonce verification, which are standard WordPress security mechanisms to validate user permissions and prevent CSRF attacks. This design flaw enables unauthenticated attackers to invoke this AJAX endpoint and inject arbitrary WordPress media attachments into galleries, as well as manipulate gallery metadata. Although attackers cannot upload new files or move existing files on the server, the ability to inject media attachments and alter metadata can lead to unauthorized content display, potential misinformation, or defacement of galleries. The vulnerability impacts the integrity of the affected WordPress sites but does not compromise confidentiality or availability directly. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the network attack vector, no privileges required, no user interaction needed, and limited impact confined to integrity. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is cataloged under CWE-862 (Missing Authorization).
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the integrity of WordPress sites using the Contest Gallery plugin. Attackers could manipulate gallery content by injecting unauthorized media attachments or altering metadata, potentially damaging brand reputation, misleading users, or facilitating social engineering attacks. While it does not allow file uploads or server compromise, unauthorized content manipulation can undermine trust and may be leveraged as part of broader attack chains. Organizations in sectors relying heavily on public-facing WordPress galleries—such as media, e-commerce, cultural institutions, and event organizers—are particularly at risk. Additionally, GDPR considerations arise if manipulated galleries lead to misinformation or affect user data indirectly. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic attacks, especially on sites without timely updates or mitigations.
Mitigation Recommendations
Immediate mitigation steps include disabling or restricting access to the 'cg_check_wp_admin_upload_v10' AJAX action if possible, for example by implementing custom capability checks or nonce verification via WordPress hooks or firewall rules. Organizations should monitor web server logs for unusual AJAX requests targeting this action. Applying updates to the plugin once a patch is released is critical; until then, consider temporarily deactivating the Contest Gallery plugin if galleries are not essential or replacing it with alternative plugins that follow secure coding practices. Web Application Firewalls (WAFs) can be configured to block unauthenticated requests to this AJAX endpoint. Additionally, hardening WordPress installations by enforcing strict user roles and permissions, limiting plugin installations to trusted sources, and conducting regular security audits will reduce exposure. Backup and recovery plans should be reviewed to quickly restore any manipulated content. Finally, educating site administrators about this vulnerability and encouraging prompt patch management is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T21:38:51.157Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69182360b7cdcddb4ca68f99
Added to database: 11/15/2025, 6:53:20 AM
Last enriched: 11/15/2025, 7:08:09 AM
Last updated: 11/15/2025, 2:54:19 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13199: Path Traversal: '../filedir' in code-projects Email Logging Interface
MediumCVE-2025-13198: Unrestricted Upload in DouPHP
MediumCVE-2024-0562: Use After Free
HighCVE-2025-13191: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-13190: Stack-based Buffer Overflow in D-Link DIR-816L
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.