CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI Analysis
Technical Summary
CVE-2025-14288 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery' affecting all versions up to and including 3.3.0. The root cause is the plugin's improper permission check in the AJAX handler 'pgc_sgb_action_wizard' responsible for updating plugin options. Instead of verifying the 'manage_options' capability—which is typically reserved for administrators—the plugin only checks for 'edit_posts', a capability granted to lower-privileged roles such as Contributors and above. This authorization flaw allows any authenticated user with Contributor-level access or higher to modify arbitrary plugin settings that start with the prefix 'pgc_sgb_*'. These settings control the behavior and appearance of galleries and lightboxes on the WordPress site. Although the vulnerability does not allow direct data exfiltration or denial of service, unauthorized changes to plugin settings can lead to site misconfigurations, potential privilege escalation, or insertion of malicious content if combined with other vulnerabilities. The CVSS v3.1 base score is 4.3 (medium), reflecting the vulnerability's limited impact on confidentiality and availability but notable impact on integrity. No public exploits have been reported to date, but the ease of exploitation by any authenticated user with contributor privileges makes this a significant risk for multi-user WordPress environments. The lack of a patch link suggests that users should monitor the vendor's updates or apply manual mitigations.
Potential Impact
For European organizations, especially those relying on WordPress for content management and using the affected plugin, this vulnerability poses a risk to the integrity of website content and configuration. Unauthorized modification of plugin settings could lead to altered gallery displays, potential injection of malicious content, or disruption of user experience, which may damage brand reputation and user trust. While the vulnerability does not directly compromise sensitive data confidentiality or availability, it could be leveraged as a foothold for further attacks, such as privilege escalation or cross-site scripting, if combined with other vulnerabilities. Organizations with multi-user WordPress installations, such as media companies, educational institutions, and e-commerce sites, are particularly at risk. The impact is heightened in environments where Contributor-level access is widely granted or insufficiently monitored. Given the widespread use of WordPress across Europe, the vulnerability could affect a significant number of sites if unaddressed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first audit their WordPress user roles and restrict Contributor-level access to trusted users only. Limiting the number of users with editing capabilities reduces the attack surface. Administrators should monitor and review plugin settings regularly for unauthorized changes. Until an official patch is released, consider disabling or removing the vulnerable plugin if it is not essential. If the plugin is critical, implement web application firewall (WAF) rules to block unauthorized AJAX requests targeting the 'pgc_sgb_action_wizard' handler from non-administrative users. Additionally, applying the principle of least privilege to WordPress roles and employing multi-factor authentication can further reduce risk. Organizations should subscribe to vendor and security mailing lists to receive timely updates and patches. Finally, conducting regular security assessments and penetration tests focusing on WordPress plugins can help detect similar authorization issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
Description
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI-Powered Analysis
Technical Analysis
CVE-2025-14288 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery' affecting all versions up to and including 3.3.0. The root cause is the plugin's improper permission check in the AJAX handler 'pgc_sgb_action_wizard' responsible for updating plugin options. Instead of verifying the 'manage_options' capability—which is typically reserved for administrators—the plugin only checks for 'edit_posts', a capability granted to lower-privileged roles such as Contributors and above. This authorization flaw allows any authenticated user with Contributor-level access or higher to modify arbitrary plugin settings that start with the prefix 'pgc_sgb_*'. These settings control the behavior and appearance of galleries and lightboxes on the WordPress site. Although the vulnerability does not allow direct data exfiltration or denial of service, unauthorized changes to plugin settings can lead to site misconfigurations, potential privilege escalation, or insertion of malicious content if combined with other vulnerabilities. The CVSS v3.1 base score is 4.3 (medium), reflecting the vulnerability's limited impact on confidentiality and availability but notable impact on integrity. No public exploits have been reported to date, but the ease of exploitation by any authenticated user with contributor privileges makes this a significant risk for multi-user WordPress environments. The lack of a patch link suggests that users should monitor the vendor's updates or apply manual mitigations.
Potential Impact
For European organizations, especially those relying on WordPress for content management and using the affected plugin, this vulnerability poses a risk to the integrity of website content and configuration. Unauthorized modification of plugin settings could lead to altered gallery displays, potential injection of malicious content, or disruption of user experience, which may damage brand reputation and user trust. While the vulnerability does not directly compromise sensitive data confidentiality or availability, it could be leveraged as a foothold for further attacks, such as privilege escalation or cross-site scripting, if combined with other vulnerabilities. Organizations with multi-user WordPress installations, such as media companies, educational institutions, and e-commerce sites, are particularly at risk. The impact is heightened in environments where Contributor-level access is widely granted or insufficiently monitored. Given the widespread use of WordPress across Europe, the vulnerability could affect a significant number of sites if unaddressed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first audit their WordPress user roles and restrict Contributor-level access to trusted users only. Limiting the number of users with editing capabilities reduces the attack surface. Administrators should monitor and review plugin settings regularly for unauthorized changes. Until an official patch is released, consider disabling or removing the vulnerable plugin if it is not essential. If the plugin is critical, implement web application firewall (WAF) rules to block unauthorized AJAX requests targeting the 'pgc_sgb_action_wizard' handler from non-administrative users. Additionally, applying the principle of least privilege to WordPress roles and employing multi-factor authentication can further reduce risk. Organizations should subscribe to vendor and security mailing lists to receive timely updates and patches. Finally, conducting regular security assessments and penetration tests focusing on WordPress plugins can help detect similar authorization issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-08T19:16:10.267Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5021
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/13/2025, 5:04:37 AM
Last updated: 12/14/2025, 6:54:37 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14672: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14674: Injection in aizuda snail-job
MediumCVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.