Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14003: CWE-862 Missing Authorization in wpchill Image Gallery – Photo Grid & Video Gallery

0
Medium
VulnerabilityCVE-2025-14003cvecve-2025-14003cwe-862
Published: Mon Dec 15 2025 (12/15/2025, 14:25:10 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Gallery – Photo Grid & Video Gallery

Description

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `add_images_to_gallery_callback()` function in all versions up to, and including, 2.13.3. This makes it possible for authenticated attackers, with Author-level access and above, to add images to arbitrary Modula galleries owned by other users.

AI-Powered Analysis

AILast updated: 12/15/2025, 15:00:57 UTC

Technical Analysis

CVE-2025-14003 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Image Gallery – Photo Grid & Video Gallery' developed by wpchill. The vulnerability exists in the add_images_to_gallery_callback() function, which lacks proper capability checks before allowing image additions to galleries. This flaw permits authenticated users with Author-level privileges or higher to add images to Modula galleries owned by other users, effectively enabling unauthorized data modification. The vulnerability affects all plugin versions up to and including 2.13.3. The CVSS v3.1 score is 4.3 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (Author-level), no user interaction, and impacts only integrity without affecting confidentiality or availability. The absence of a patch at the time of publication means the vulnerability remains exploitable. Although no known exploits are reported in the wild, the flaw could be leveraged in multi-user WordPress environments to manipulate gallery content, potentially leading to reputational damage or misuse of the platform for unauthorized content distribution. The vulnerability's exploitation does not require user interaction, increasing its risk in environments where multiple users have Author-level access or higher. The plugin is widely used for managing image and video galleries in WordPress sites, making the vulnerability relevant to many organizations relying on this CMS for content management.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of web content managed via WordPress sites using the affected plugin. Unauthorized addition of images to galleries could lead to defacement, misinformation, or insertion of inappropriate or malicious content, potentially damaging brand reputation and user trust. Organizations with multi-user WordPress environments, such as media companies, e-commerce platforms, and public sector websites, are particularly vulnerable if they grant Author-level access to multiple users. While the vulnerability does not directly compromise confidentiality or availability, the integrity breach could be leveraged in social engineering or phishing campaigns if malicious images are inserted. Additionally, regulatory frameworks like GDPR emphasize data integrity and security, so failure to address such vulnerabilities could result in compliance issues. The medium severity score reflects the limited scope of impact but highlights the importance of controlling user privileges and monitoring content changes. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code could be developed given the vulnerability's straightforward nature.

Mitigation Recommendations

1. Immediately audit and restrict WordPress user roles to minimize the number of users with Author-level or higher privileges, ensuring only trusted personnel have such access. 2. Implement monitoring and alerting on gallery content changes to detect unauthorized modifications promptly. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the add_images_to_gallery_callback() function or related endpoints. 4. Regularly back up WordPress site content, including galleries, to enable quick restoration in case of unauthorized changes. 5. Engage with the plugin vendor or community to obtain or develop patches addressing the missing authorization check and apply them as soon as available. 6. Consider temporarily disabling or replacing the affected plugin with alternative gallery management solutions that enforce strict authorization controls until a patch is released. 7. Educate WordPress administrators and content managers about the risks of privilege misuse and the importance of role-based access control. 8. Review and harden WordPress security configurations, including limiting plugin installations and enforcing least privilege principles across all users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T07:14:09.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69401ef9d9bcdf3f3de12794

Added to database: 12/15/2025, 2:45:13 PM

Last enriched: 12/15/2025, 3:00:57 PM

Last updated: 12/15/2025, 5:16:34 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats