CVE-2025-14455

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to bypass authorization checks in the Image Photo Gallery Final Tiles Grid plugin. Attackers can delete, modify, or clone galleries created by any user, including administrators. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Image Photo Gallery Final Tiles Grid WordPress plugin
Versions: All versions up to and including 3.6.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin and at least one user with Contributor role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious contributors could delete or modify all galleries, potentially defacing websites or removing critical content, while administrators remain unaware of unauthorized changes.

🟠

Likely Case

Contributors or authors exploiting the vulnerability to tamper with galleries they shouldn't have access to, causing content disruption and potential data loss.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to unauthorized gallery modifications that can be detected and rolled back.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is well-documented with specific code locations identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.6.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3417363/final-tiles-grid-gallery-lite/trunk/FinalTilesGalleryLite.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Image Photo Gallery Final Tiles Grid'. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate final-tiles-grid-gallery-lite

Restrict User Roles

all

Temporarily remove Contributor and Author roles or restrict gallery management capabilities

wp user list --role=contributor --field=ID
wp user set-role <user_id> subscriber

🧯 If You Can't Patch

  • Implement strict user role auditing and monitor gallery modification logs
  • Use web application firewall rules to block suspicious gallery management requests from non-admin users

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 3.6.7 or lower, you are vulnerable.

Check Version:

wp plugin get final-tiles-grid-gallery-lite --field=version

Verify Fix Applied:

After updating, verify plugin version is higher than 3.6.7. Test gallery management functions with Contributor account to ensure proper authorization checks.

📡 Detection & Monitoring

Log Indicators:

  • WordPress logs showing gallery delete/modify/clone actions from non-admin users
  • Plugin-specific logs showing unauthorized gallery management attempts

Network Indicators:

  • POST requests to gallery management endpoints from non-admin user sessions
  • Unusual gallery modification patterns

SIEM Query:

source="wordpress" AND (action="delete_gallery" OR action="modify_gallery" OR action="clone_gallery") AND user_role!="administrator"

🔗 References

📤 Share & Export