Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14003: CWE-862 Missing Authorization in wpchill Image Gallery – Photo Grid & Video Gallery

0
Medium
VulnerabilityCVE-2025-14003cvecve-2025-14003cwe-862
Published: Mon Dec 15 2025 (12/15/2025, 14:25:10 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `add_images_to_gallery_callback()` function in all versions up to, and including, 2.13.3. This makes it possible for authenticated attackers, with Author-level access and above, to add images to arbitrary Modula galleries owned by other users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:40:57 UTC

Technical Analysis

CVE-2025-14003 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Image Gallery – Photo Grid & Video Gallery' developed by wpchill. The vulnerability exists in the add_images_to_gallery_callback() function, which lacks proper capability checks to verify if the authenticated user has permission to modify a specific gallery. As a result, any user with Author-level privileges or higher can add images to Modula galleries owned by other users, bypassing intended access controls. This flaw affects all plugin versions up to and including 2.13.3. The vulnerability does not require user interaction and can be exploited remotely over the network by authenticated users. The CVSS v3.1 base score is 4.3, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning it is remotely exploitable with low attack complexity, requires privileges, no user interaction, unchanged scope, no confidentiality or availability impact, but causes integrity loss. No patches were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability could allow attackers to manipulate gallery content, potentially leading to misinformation, defacement, or reputational damage for affected sites.

Potential Impact

The primary impact of CVE-2025-14003 is unauthorized modification of gallery content within WordPress sites using the vulnerable plugin. Attackers with Author-level access can add images to galleries they do not own, potentially inserting inappropriate, misleading, or malicious content. This can degrade the integrity of website content, harm brand reputation, and confuse or mislead site visitors. Although it does not directly affect confidentiality or availability, the integrity compromise can facilitate further social engineering or phishing attacks if malicious images are added. For organizations relying on WordPress for content management, especially those with multiple content contributors, this vulnerability undermines role-based access controls and content governance. The ease of exploitation by authenticated users means insider threats or compromised Author accounts can be leveraged. The lack of known exploits reduces immediate risk, but the widespread use of WordPress and the plugin increases potential exposure globally.

Mitigation Recommendations

To mitigate CVE-2025-14003, organizations should first check for and apply any official patches or updates released by wpchill addressing this vulnerability. If no patch is available, temporarily disabling the plugin or restricting Author-level user permissions can reduce risk. Implement strict user role management by limiting Author privileges to trusted users only. Employ additional access control plugins or custom code to enforce capability checks on gallery modification functions. Monitor logs for unusual gallery modification activities, especially from Author-level users. Consider isolating or sandboxing galleries to minimize cross-user content manipulation. Educate content contributors about the risk of compromised accounts and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all users with elevated privileges. Regularly audit plugin usage and permissions to detect and respond to unauthorized changes promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T07:14:09.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69401ef9d9bcdf3f3de12794

Added to database: 12/15/2025, 2:45:13 PM

Last enriched: 2/27/2026, 10:40:57 AM

Last updated: 3/24/2026, 4:52:58 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses