CVE-2025-12359: CWE-918 Server-Side Request Forgery (SSRF) in dfactory Responsive Lightbox & Gallery
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.3 via the 'get_image_size_by_url' function. This is due to insufficient validation of user-supplied URLs when determining image dimensions for gallery items. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-12359 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Responsive Lightbox & Gallery plugin for WordPress, specifically in versions up to and including 2.5.3. The vulnerability arises from the 'get_image_size_by_url' function, which fails to properly validate user-supplied URLs when determining image dimensions for gallery items. This lack of validation allows an authenticated attacker with Author-level access or higher to craft requests that cause the server to initiate HTTP requests to arbitrary locations. SSRF vulnerabilities like this can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal service manipulation or lateral movement. The vulnerability does not require user interaction beyond authentication, and the CVSS 3.1 base score is 5.4, indicating a medium severity level. The attack vector is network-based with low attack complexity and privileges required at the Author level, but no user interaction is needed. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was published on November 19, 2025, and assigned by Wordfence. Given the widespread use of WordPress and the popularity of the Responsive Lightbox & Gallery plugin, this vulnerability poses a tangible risk to websites that have not updated or mitigated the issue.
Potential Impact
For European organizations, this SSRF vulnerability can have significant consequences. Exploitation allows attackers to make arbitrary HTTP requests from the vulnerable web server, potentially accessing internal services such as intranet applications, databases, or cloud metadata endpoints. This can lead to unauthorized disclosure of sensitive information, including internal IP addresses, configuration data, or credentials. Additionally, attackers might manipulate internal services if they are accessible via HTTP, compromising data integrity. While the vulnerability does not directly impact availability, successful exploitation can facilitate further attacks that degrade service or lead to data breaches. Organizations relying on WordPress sites with this plugin, especially those exposing sensitive internal resources or operating in regulated sectors (finance, healthcare, government), face increased risk of compliance violations and reputational damage. The requirement for Author-level authentication limits exposure but does not eliminate risk, as compromised or malicious insiders could exploit this flaw. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Responsive Lightbox & Gallery plugin and its version. Until an official patch is released, practical mitigations include restricting Author-level user privileges to trusted personnel only and monitoring for unusual outbound HTTP requests originating from web servers hosting the plugin. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting internal IP ranges can reduce risk. Network segmentation should be enforced to limit the web server's ability to reach sensitive internal services. Additionally, disabling or restricting the plugin's functionality related to external image URL processing can serve as a temporary workaround. Organizations should subscribe to vendor and security mailing lists to promptly apply patches once available. Regular security audits and user access reviews will further reduce the likelihood of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12359: CWE-918 Server-Side Request Forgery (SSRF) in dfactory Responsive Lightbox & Gallery
Description
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.3 via the 'get_image_size_by_url' function. This is due to insufficient validation of user-supplied URLs when determining image dimensions for gallery items. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2025-12359 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Responsive Lightbox & Gallery plugin for WordPress, specifically in versions up to and including 2.5.3. The vulnerability arises from the 'get_image_size_by_url' function, which fails to properly validate user-supplied URLs when determining image dimensions for gallery items. This lack of validation allows an authenticated attacker with Author-level access or higher to craft requests that cause the server to initiate HTTP requests to arbitrary locations. SSRF vulnerabilities like this can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive information or enabling further attacks such as internal service manipulation or lateral movement. The vulnerability does not require user interaction beyond authentication, and the CVSS 3.1 base score is 5.4, indicating a medium severity level. The attack vector is network-based with low attack complexity and privileges required at the Author level, but no user interaction is needed. Currently, there are no known exploits in the wild, and no official patches have been linked yet. The vulnerability was published on November 19, 2025, and assigned by Wordfence. Given the widespread use of WordPress and the popularity of the Responsive Lightbox & Gallery plugin, this vulnerability poses a tangible risk to websites that have not updated or mitigated the issue.
Potential Impact
For European organizations, this SSRF vulnerability can have significant consequences. Exploitation allows attackers to make arbitrary HTTP requests from the vulnerable web server, potentially accessing internal services such as intranet applications, databases, or cloud metadata endpoints. This can lead to unauthorized disclosure of sensitive information, including internal IP addresses, configuration data, or credentials. Additionally, attackers might manipulate internal services if they are accessible via HTTP, compromising data integrity. While the vulnerability does not directly impact availability, successful exploitation can facilitate further attacks that degrade service or lead to data breaches. Organizations relying on WordPress sites with this plugin, especially those exposing sensitive internal resources or operating in regulated sectors (finance, healthcare, government), face increased risk of compliance violations and reputational damage. The requirement for Author-level authentication limits exposure but does not eliminate risk, as compromised or malicious insiders could exploit this flaw. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Responsive Lightbox & Gallery plugin and its version. Until an official patch is released, practical mitigations include restricting Author-level user privileges to trusted personnel only and monitoring for unusual outbound HTTP requests originating from web servers hosting the plugin. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting internal IP ranges can reduce risk. Network segmentation should be enforced to limit the web server's ability to reach sensitive internal services. Additionally, disabling or restricting the plugin's functionality related to external image URL processing can serve as a temporary workaround. Organizations should subscribe to vendor and security mailing lists to promptly apply patches once available. Regular security audits and user access reviews will further reduce the likelihood of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T16:13:08.985Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d6897a27e6d5e91bc16c0
Added to database: 11/19/2025, 6:49:59 AM
Last enriched: 11/19/2025, 6:50:36 AM
Last updated: 11/20/2025, 10:13:37 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighCVE-2023-3899: Improper Authorization in Red Hat Red Hat Enterprise Linux 7
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.