CVE-2025-12081

4.3 MEDIUM

📋 TL;DR

The ACF Photo Gallery Field plugin for WordPress has a missing capability check that allows authenticated users with subscriber-level access or higher to modify titles, captions, and custom metadata of arbitrary media attachments. This affects all WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • ACF Photo Gallery Field WordPress Plugin
Versions: All versions up to and including 3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (subscriber role or higher) can exploit this vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could deface websites by modifying media metadata, inject malicious content into captions/titles that could be displayed to users, or manipulate media data to support social engineering attacks.

🟠

Likely Case

Low-privileged users could vandalize media galleries by changing titles and captions, potentially causing confusion or minor content integrity issues.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor content manipulation that can be detected and reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - just sending crafted POST requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3428006%40navz-photo-gallery&new=3428006%40navz-photo-gallery&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ACF Photo Gallery Field'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin, then install the latest version from WordPress repository.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Deactivate and delete the vulnerable plugin version

wp plugin deactivate navz-photo-gallery
wp plugin delete navz-photo-gallery

Restrict user registration

all

Temporarily disable new user registration to prevent new low-privileged accounts

wp option update users_can_register 0

🧯 If You Can't Patch

  • Implement strict access controls and monitor media modification activities
  • Regularly audit and backup media metadata to detect and revert unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'ACF Photo Gallery Field' version 3.0 or earlier

Check Version:

wp plugin get navz-photo-gallery --field=version

Verify Fix Applied:

Verify plugin version is greater than 3.0 or plugin is removed entirely

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=acf_photo_gallery_edit_save from low-privileged users
  • Unexpected media metadata modifications

Network Indicators:

  • HTTP POST requests containing acf_photo_gallery_edit_save parameter

SIEM Query:

source="wordpress" AND (url_path="/wp-admin/admin-ajax.php" AND post_data="*acf_photo_gallery_edit_save*")

🔗 References

📤 Share & Export