Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12237: CWE-918 Server-Side Request Forgery (SSRF) in nik00726 Photo Gallery Slideshow & Masonry Tiled Gallery

0
Medium
VulnerabilityCVE-2024-12237cvecve-2024-12237cwe-918
Published: Fri Jan 03 2025 (01/03/2025, 22:22:05 UTC)
Source: CVE Database V5
Vendor/Project: nik00726
Product: Photo Gallery Slideshow & Masonry Tiled Gallery

Description

CVE-2024-12237 is a Server-Side Request Forgery (SSRF) vulnerability found in the nik00726 Photo Gallery Slideshow & Masonry Tiled Gallery WordPress plugin, affecting all versions up to 1. 0. 15. Authenticated users with Subscriber-level access or higher can exploit this flaw via the rjg_get_youtube_info_justified_gallery_callback function to make arbitrary web requests from the server. This can allow attackers to access internal services and retrieve limited information not normally exposed externally. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3, indicating medium severity. There are no known exploits in the wild currently, and no official patches have been published yet. Organizations using this plugin should monitor for updates and restrict access to trusted users. The threat primarily affects WordPress sites using this specific plugin, which may be more common in countries with high WordPress adoption and active web development communities.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:59:04 UTC

Technical Analysis

CVE-2024-12237 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, present in the nik00726 Photo Gallery Slideshow & Masonry Tiled Gallery WordPress plugin. The vulnerability exists in all versions up to and including 1.0.15, specifically within the function rjg_get_youtube_info_justified_gallery_callback. This function improperly handles user input, allowing authenticated users with Subscriber-level privileges or higher to induce the server to make HTTP requests to arbitrary destinations. SSRF vulnerabilities enable attackers to leverage the server as a proxy to access internal or protected network resources that are otherwise inaccessible externally. Although the attacker must be authenticated, the low privilege requirement (Subscriber role) increases the attack surface, as this role is commonly assigned to registered users or commenters on WordPress sites. The vulnerability does not require additional user interaction beyond authentication and does not impact integrity or availability directly but can lead to limited confidentiality breaches by exposing internal service information. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low attack complexity, and low privileges required. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The plugin’s widespread use in WordPress ecosystems makes this a relevant threat for many organizations relying on this plugin for gallery functionality.

Potential Impact

The primary impact of CVE-2024-12237 is the potential exposure of internal network resources and sensitive information through SSRF exploitation. Attackers with minimal privileges can leverage the vulnerability to send arbitrary requests from the server, potentially accessing internal APIs, metadata services, or other protected endpoints. This can lead to reconnaissance that facilitates further attacks such as privilege escalation, lateral movement, or data exfiltration. While the vulnerability does not directly compromise data integrity or availability, the confidentiality impact can be significant depending on the internal services exposed. Organizations running WordPress sites with this plugin may face increased risk of internal network exposure, especially if internal services lack proper segmentation or authentication. The medium severity score reflects the limited scope of impact and the requirement for authenticated access, but the ease of exploitation by low-privilege users increases the threat level. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. Overall, this vulnerability can undermine trust in affected websites and expose sensitive infrastructure details to attackers.

Mitigation Recommendations

To mitigate CVE-2024-12237, organizations should first restrict plugin usage to trusted administrators and avoid granting Subscriber or higher roles to untrusted users. Implement strict user role management and limit authentication to verified users only. Network segmentation and firewall rules should be applied to restrict outbound HTTP requests from the web server to only necessary destinations, preventing SSRF exploitation from reaching internal services. Monitoring and logging of outbound requests can help detect suspicious activity indicative of SSRF attempts. Since no official patch is currently available, consider temporarily disabling or removing the vulnerable plugin until a fix is released. Alternatively, review and modify the plugin code to sanitize and validate inputs in the rjg_get_youtube_info_justified_gallery_callback function, preventing arbitrary URL requests. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests. Finally, keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-05T11:42:13.345Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e32b7ef31ef0b5979a4

Added to database: 2/25/2026, 9:48:34 PM

Last enriched: 2/26/2026, 5:59:04 AM

Last updated: 2/26/2026, 6:10:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats