Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid

0
Medium
VulnerabilityCVE-2025-14455cvecve-2025-14455cwe-862
Published: Fri Dec 19 2025 (12/19/2025, 09:29:48 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Photo Gallery Final Tiles Grid

Description

The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.7. This is due to the plugin not properly verifying that a user is authorized to perform actions on gallery management functions. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete, modify, or clone galleries created by any user, including administrators.

AI-Powered Analysis

AILast updated: 12/19/2025, 09:54:52 UTC

Technical Analysis

CVE-2025-14455 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WordPress plugin 'Image Photo Gallery Final Tiles Grid' developed by wpchill. This plugin, widely used for managing image galleries on WordPress sites, suffers from improper authorization checks in all versions up to and including 3.6.7. The flaw allows any authenticated user with at least Contributor-level privileges to bypass authorization controls and perform unauthorized actions on gallery management functions. Specifically, attackers can delete, modify, or clone galleries created by other users, including those created by administrators. The vulnerability arises because the plugin fails to verify whether the user has the necessary permissions before allowing these sensitive operations. Exploitation requires the attacker to have an authenticated account with Contributor or higher access, but no additional user interaction is needed. The vulnerability can be exploited remotely over the network (AV:N), with low attack complexity (AC:L), and no user interaction (UI:N). The impact affects the integrity and availability of gallery data but does not compromise confidentiality. The CVSS v3.1 base score is 5.4, indicating medium severity. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. Organizations using this plugin should monitor for updates from the vendor and consider immediate mitigation steps to prevent unauthorized gallery manipulation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of image galleries hosted on WordPress sites using the affected plugin. Unauthorized modification or deletion of galleries could disrupt business operations, damage brand reputation, and result in loss of important visual content. Organizations relying on image galleries for marketing, e-commerce, or customer engagement may face operational disruptions and potential loss of customer trust. Since the exploit requires authenticated access with Contributor-level permissions, insider threats or compromised user accounts could be leveraged by attackers. The vulnerability does not expose sensitive data directly but could be used as a stepping stone for further attacks or social engineering. Given the widespread use of WordPress across Europe, especially in small and medium enterprises, media companies, and public sector websites, the impact could be significant if left unaddressed.

Mitigation Recommendations

1. Immediately restrict Contributor-level and higher permissions to trusted users only, minimizing the risk of exploitation by unauthorized insiders or compromised accounts. 2. Monitor user accounts for suspicious activity, especially those with Contributor or higher roles, and enforce strong authentication mechanisms such as MFA. 3. If possible, temporarily disable or replace the 'Image Photo Gallery Final Tiles Grid' plugin until a vendor patch is released. 4. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized gallery management requests that do not originate from legitimate administrators. 5. Regularly audit WordPress user roles and permissions to ensure least privilege principles are enforced. 6. Stay alert for vendor updates or security advisories and apply patches promptly once available. 7. Backup gallery data frequently to enable recovery in case of unauthorized deletion or modification. 8. Consider alternative gallery plugins with better security track records if immediate patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T14:47:25.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69451dcdc326d36e537b0ec3

Added to database: 12/19/2025, 9:41:33 AM

Last enriched: 12/19/2025, 9:54:52 AM

Last updated: 12/19/2025, 12:23:37 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats