Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid

0
Medium
VulnerabilityCVE-2025-14455cvecve-2025-14455cwe-862
Published: Fri Dec 19 2025 (12/19/2025, 09:29:48 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Photo Gallery Final Tiles Grid

Description

The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.7. This is due to the plugin not properly verifying that a user is authorized to perform actions on gallery management functions. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete, modify, or clone galleries created by any user, including administrators.

AI-Powered Analysis

AILast updated: 12/26/2025, 10:30:58 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14455 affects the 'Image Photo Gallery Final Tiles Grid' WordPress plugin developed by wpchill. This plugin is widely used to manage photo galleries on WordPress sites. The core issue is a missing authorization check (CWE-862) that allows authenticated users with Contributor-level permissions or higher to bypass intended access controls. Specifically, the plugin fails to verify whether the user is authorized to perform sensitive gallery management functions such as deleting, modifying, or cloning galleries. Consequently, an attacker with legitimate Contributor access can manipulate galleries created by any user, including administrators, potentially disrupting website content and operations. The vulnerability affects all plugin versions up to and including 3.6.7. The CVSS 3.1 base score is 5.4, indicating a medium severity level, with attack vector being network-based, low attack complexity, requiring privileges (Contributor or above), no user interaction, and impacting integrity and availability but not confidentiality. No patches were linked at the time of disclosure, and no active exploits have been reported. The vulnerability is significant because Contributor-level users are commonly granted on WordPress sites to allow content creation without full administrative rights, and this flaw elevates their capabilities to unauthorized gallery management actions. This can lead to defacement, content loss, or unauthorized content duplication, undermining trust and site functionality.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of website content managed via WordPress using the affected plugin. Organizations relying on WordPress for marketing, communications, or e-commerce that utilize the Image Photo Gallery Final Tiles Grid plugin may experience unauthorized content modifications or deletions, potentially damaging brand reputation and user trust. Since the vulnerability requires only Contributor-level access, insider threats or compromised contributor accounts can be leveraged to exploit this flaw. The impact is heightened for organizations with multiple contributors or external content creators. While confidentiality is not directly affected, the disruption to content integrity and availability can lead to operational downtime, increased incident response costs, and potential regulatory scrutiny if content tampering affects compliance-related information. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. European organizations with public-facing WordPress sites should prioritize assessment and mitigation to prevent exploitation.

Mitigation Recommendations

1. Immediately audit WordPress sites for the presence of the Image Photo Gallery Final Tiles Grid plugin and identify versions up to 3.6.7. 2. Restrict Contributor-level permissions where possible, limiting gallery management capabilities to trusted roles only. 3. Implement strict role-based access controls (RBAC) and consider temporarily disabling the plugin if feasible until a patch is available. 4. Monitor logs and user activities related to gallery management functions for suspicious actions, especially deletions or modifications initiated by Contributors. 5. Apply vendor patches or updates promptly once released; if no patch is available, consider alternative gallery plugins with proper authorization controls. 6. Educate content contributors about the risk of account compromise and enforce strong authentication mechanisms, such as multi-factor authentication (MFA). 7. Regularly back up website content, including galleries, to enable quick restoration in case of unauthorized changes. 8. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized gallery management requests from lower-privileged users.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T14:47:25.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69451dcdc326d36e537b0ec3

Added to database: 12/19/2025, 9:41:33 AM

Last enriched: 12/26/2025, 10:30:58 AM

Last updated: 2/6/2026, 12:57:11 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats