Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery

0
Medium
VulnerabilityCVE-2025-14288cvecve-2025-14288cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:25 UTC)
Source: CVE Database V5
Vendor/Project: gallerycreator
Product: Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery

Description

The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:03:44 UTC

Technical Analysis

CVE-2025-14288 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery,' affecting all versions up to and including 3.3.0. The root cause is the plugin's use of the 'edit_posts' capability check instead of the more restrictive 'manage_options' capability when handling the 'update_option' action in the 'pgc_sgb_action_wizard' AJAX handler. This improper authorization allows any authenticated user with at least Contributor-level privileges to modify arbitrary plugin settings that begin with the prefix 'pgc_sgb_*'. Since Contributors typically cannot manage plugin options, this represents a privilege escalation within the plugin's context. The vulnerability does not expose confidential data or affect system availability but compromises the integrity of plugin settings, potentially enabling attackers to alter gallery behavior or introduce malicious configurations. The attack vector is remote and network-based, requiring authentication but no additional user interaction. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin used globally means it could be targeted in the future. The issue is due to a common authorization misconfiguration, emphasizing the importance of correct capability checks in WordPress plugins.

Potential Impact

The primary impact of CVE-2025-14288 is unauthorized modification of plugin settings by users with Contributor-level access or higher. This can lead to integrity violations where attackers alter gallery configurations, potentially enabling malicious content display, bypassing content restrictions, or introducing vectors for further attacks such as cross-site scripting or phishing via manipulated galleries. While confidentiality and availability are not directly affected, the altered settings could degrade user trust or site functionality. For organizations relying on this plugin, especially those with multiple contributors or editors, the risk includes unauthorized changes that may go unnoticed and could be leveraged for broader attacks or reputational damage. Since the vulnerability requires authenticated access, it is less likely to be exploited by external unauthenticated attackers but poses a significant risk in environments with many users or weak account controls. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as the plugin is widely used in WordPress sites worldwide.

Mitigation Recommendations

To mitigate CVE-2025-14288, organizations should immediately update the plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher user roles from accessing or invoking the vulnerable AJAX handler by implementing custom capability checks or using security plugins that can block unauthorized AJAX requests. Review and tighten user role assignments to ensure only trusted users have Contributor or higher privileges. Employ web application firewalls (WAFs) with rules targeting suspicious AJAX requests related to 'pgc_sgb_action_wizard'. Monitor plugin settings for unexpected changes and audit user activities regularly. Consider temporarily disabling the plugin if it is not critical to site functionality. Developers should correct the authorization check by replacing 'edit_posts' with 'manage_options' for the update_option action to ensure only administrators can modify plugin settings. Additionally, implement logging for all changes to plugin options to detect unauthorized modifications promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-08T19:16:10.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5021

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 2/27/2026, 11:03:44 AM

Last updated: 3/24/2026, 7:46:31 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses