Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15466: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid

0
Medium
VulnerabilityCVE-2025-15466cvecve-2025-15466cwe-862
Published: Mon Jan 19 2026 (01/19/2026, 23:21:52 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Image Photo Gallery Final Tiles Grid

Description

CVE-2025-15466 is a medium-severity vulnerability in the WordPress plugin 'Image Photo Gallery Final Tiles Grid' by wpchill, affecting all versions up to 3. 6. 9. The flaw arises from missing authorization checks on multiple AJAX actions, allowing authenticated users with Contributor-level access or higher to perform unauthorized operations on galleries owned by other users, including administrators. Exploitable actions include viewing, creating, modifying, cloning, deleting, and reassigning gallery ownership. The vulnerability does not require user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the risk lies in privilege escalation within WordPress sites using this plugin. European organizations using this plugin, especially those with multi-user WordPress environments, face risks to data confidentiality and integrity. Mitigation involves promptly updating the plugin once a patch is available or restricting Contributor-level access and auditing user permissions. Countries with high WordPress adoption and significant use of this plugin, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/19/2026, 23:50:26 UTC

Technical Analysis

CVE-2025-15466 is a vulnerability classified under CWE-862 (Missing Authorization) found in the 'Image Photo Gallery Final Tiles Grid' WordPress plugin developed by wpchill. This plugin, widely used for managing photo galleries in WordPress sites, suffers from a lack of proper capability checks on several AJAX endpoints. These endpoints handle critical gallery management functions such as viewing, creating, modifying, cloning, deleting, and reassigning ownership of galleries. The vulnerability affects all versions up to and including 3.6.9. An attacker with authenticated access at the Contributor role or higher can exploit this flaw to manipulate galleries created by other users, including administrators, without proper authorization. The attack vector is network-based and does not require user interaction, increasing the ease of exploitation. The CVSS v3.1 base score is 5.4 (medium severity), reflecting low complexity and low privileges required but limited impact on availability. The vulnerability compromises confidentiality and integrity by enabling unauthorized data access and modification. No patches are currently available, and no known exploits have been reported in the wild. The issue was publicly disclosed in January 2026 by Wordfence, with the vulnerability reserved earlier that month. Organizations using this plugin in multi-user WordPress environments are at risk of privilege escalation and unauthorized data manipulation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of digital assets managed via WordPress sites using the affected plugin. Unauthorized users with Contributor-level access can escalate privileges to manipulate galleries owned by other users, potentially including sensitive or proprietary images. This could lead to data leakage, unauthorized content modification, or disruption of digital asset management workflows. While availability is not directly impacted, the trustworthiness and integrity of content are compromised, which can affect brand reputation and compliance with data protection regulations such as GDPR. Organizations with collaborative content management environments, such as media companies, marketing agencies, and educational institutions, are particularly vulnerable. The lack of a patch increases exposure time, and the ease of exploitation means attackers can leverage this vulnerability to gain unauthorized control over gallery content without requiring administrator credentials or user interaction.

Mitigation Recommendations

Immediate mitigation should focus on restricting Contributor-level access and above to trusted users only, minimizing the number of users who can exploit this vulnerability. Administrators should audit user roles and permissions to ensure no unnecessary privileges are granted. Until an official patch is released, consider disabling or removing the 'Image Photo Gallery Final Tiles Grid' plugin if feasible, especially in high-risk environments. Implement web application firewalls (WAFs) with custom rules to monitor and block suspicious AJAX requests targeting gallery management endpoints. Regularly monitor WordPress and plugin update channels for the release of a security patch and apply it promptly. Additionally, enable detailed logging of user actions related to gallery management to detect potential exploitation attempts. Educate site administrators and content managers about the risks associated with this vulnerability and encourage the use of strong authentication methods to reduce the risk of compromised accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-05T22:20:17.348Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ebfdb4623b1157cd409c0

Added to database: 1/19/2026, 11:35:55 PM

Last enriched: 1/19/2026, 11:50:26 PM

Last updated: 1/20/2026, 2:03:11 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats