CVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
The Contest Gallery plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 28.0.2. This is due to the plugin registering the `cg_check_wp_admin_upload_v10` AJAX action for both authenticated and unauthenticated users without implementing capability checks or nonce verification. This makes it possible for unauthenticated attackers to inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata via the `cg_check_wp_admin_upload_v10` action. It does not enable an attacker to move or upload files.
AI Analysis
Technical Summary
The Contest Gallery plugin for WordPress, widely used to manage contests with features like uploading, voting, and selling via PayPal and Stripe, suffers from an authorization bypass vulnerability identified as CVE-2025-12849. The root cause is the registration of the AJAX action `cg_check_wp_admin_upload_v10` for both authenticated and unauthenticated users without enforcing capability checks or nonce verification, violating secure coding practices and CWE-862 (Missing Authorization). This flaw enables unauthenticated attackers to inject arbitrary media attachments into galleries and alter gallery metadata, potentially leading to content manipulation or defacement. Although the vulnerability does not permit direct file uploads or movement, the ability to inject media attachments can be leveraged for social engineering, misinformation, or to embed malicious content indirectly. The CVSS 3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (remote), no privileges required, no user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. No public exploits have been reported yet, but the vulnerability's presence in all versions up to 28.0.2 means many WordPress sites remain at risk until patched or mitigated.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized manipulation of contest galleries on WordPress sites, potentially damaging brand reputation and user trust. Attackers might inject misleading or malicious media content, which could be used for phishing, spreading misinformation, or defacing websites. Although the vulnerability does not allow direct file uploads, the ability to manipulate gallery metadata and attachments could facilitate indirect attacks or social engineering campaigns. Organizations relying on the Contest Gallery plugin for customer engagement or e-commerce (via PayPal and Stripe integrations) may face disruptions or loss of customer confidence. Furthermore, regulatory implications under GDPR could arise if manipulated content leads to data misuse or harms user privacy indirectly. The medium severity score suggests a moderate risk, but the ease of exploitation (no authentication or user interaction required) increases the urgency for mitigation.
Mitigation Recommendations
1. Immediate update: Apply any available patches or updates from the plugin vendor once released. Since no patch links are currently provided, monitor vendor announcements closely. 2. Access control hardening: Temporarily restrict access to the AJAX action by implementing custom capability checks or nonce verification via WordPress hooks or firewall rules. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block unauthorized requests to the `cg_check_wp_admin_upload_v10` AJAX endpoint, especially from unauthenticated users. 4. Plugin audit: Review all installed WordPress plugins for similar authorization issues and remove or disable unused or untrusted plugins. 5. Monitoring and logging: Enable detailed logging of AJAX requests and media attachment changes to detect suspicious activity promptly. 6. User education: Inform site administrators about the vulnerability and encourage vigilance against unusual gallery content or metadata changes. 7. Backup: Maintain regular backups of WordPress sites and media libraries to enable quick restoration if manipulation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-12849: CWE-862 Missing Authorization in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
Description
The Contest Gallery plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 28.0.2. This is due to the plugin registering the `cg_check_wp_admin_upload_v10` AJAX action for both authenticated and unauthenticated users without implementing capability checks or nonce verification. This makes it possible for unauthenticated attackers to inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata via the `cg_check_wp_admin_upload_v10` action. It does not enable an attacker to move or upload files.
AI-Powered Analysis
Technical Analysis
The Contest Gallery plugin for WordPress, widely used to manage contests with features like uploading, voting, and selling via PayPal and Stripe, suffers from an authorization bypass vulnerability identified as CVE-2025-12849. The root cause is the registration of the AJAX action `cg_check_wp_admin_upload_v10` for both authenticated and unauthenticated users without enforcing capability checks or nonce verification, violating secure coding practices and CWE-862 (Missing Authorization). This flaw enables unauthenticated attackers to inject arbitrary media attachments into galleries and alter gallery metadata, potentially leading to content manipulation or defacement. Although the vulnerability does not permit direct file uploads or movement, the ability to inject media attachments can be leveraged for social engineering, misinformation, or to embed malicious content indirectly. The CVSS 3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (remote), no privileges required, no user interaction needed, and limited impact on integrity but no impact on confidentiality or availability. No public exploits have been reported yet, but the vulnerability's presence in all versions up to 28.0.2 means many WordPress sites remain at risk until patched or mitigated.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized manipulation of contest galleries on WordPress sites, potentially damaging brand reputation and user trust. Attackers might inject misleading or malicious media content, which could be used for phishing, spreading misinformation, or defacing websites. Although the vulnerability does not allow direct file uploads, the ability to manipulate gallery metadata and attachments could facilitate indirect attacks or social engineering campaigns. Organizations relying on the Contest Gallery plugin for customer engagement or e-commerce (via PayPal and Stripe integrations) may face disruptions or loss of customer confidence. Furthermore, regulatory implications under GDPR could arise if manipulated content leads to data misuse or harms user privacy indirectly. The medium severity score suggests a moderate risk, but the ease of exploitation (no authentication or user interaction required) increases the urgency for mitigation.
Mitigation Recommendations
1. Immediate update: Apply any available patches or updates from the plugin vendor once released. Since no patch links are currently provided, monitor vendor announcements closely. 2. Access control hardening: Temporarily restrict access to the AJAX action by implementing custom capability checks or nonce verification via WordPress hooks or firewall rules. 3. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block unauthorized requests to the `cg_check_wp_admin_upload_v10` AJAX endpoint, especially from unauthenticated users. 4. Plugin audit: Review all installed WordPress plugins for similar authorization issues and remove or disable unused or untrusted plugins. 5. Monitoring and logging: Enable detailed logging of AJAX requests and media attachment changes to detect suspicious activity promptly. 6. User education: Inform site administrators about the vulnerability and encourage vigilance against unusual gallery content or metadata changes. 7. Backup: Maintain regular backups of WordPress sites and media libraries to enable quick restoration if manipulation occurs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T21:38:51.157Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69182360b7cdcddb4ca68f99
Added to database: 11/15/2025, 6:53:20 AM
Last enriched: 11/22/2025, 8:30:18 AM
Last updated: 2/7/2026, 11:01:17 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.