Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery

0
Medium
VulnerabilityCVE-2025-14288cvecve-2025-14288cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:25 UTC)
Source: CVE Database V5
Vendor/Project: gallerycreator
Product: Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery

Description

The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:04:37 UTC

Technical Analysis

CVE-2025-14288 identifies a missing authorization vulnerability (CWE-862) in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery' affecting all versions up to and including 3.3.0. The root cause is the plugin's improper permission check in the AJAX handler 'pgc_sgb_action_wizard' responsible for updating plugin options. Instead of verifying the 'manage_options' capability—which is typically reserved for administrators—the plugin only checks for 'edit_posts', a capability granted to lower-privileged roles such as Contributors and above. This authorization flaw allows any authenticated user with Contributor-level access or higher to modify arbitrary plugin settings that start with the prefix 'pgc_sgb_*'. These settings control the behavior and appearance of galleries and lightboxes on the WordPress site. Although the vulnerability does not allow direct data exfiltration or denial of service, unauthorized changes to plugin settings can lead to site misconfigurations, potential privilege escalation, or insertion of malicious content if combined with other vulnerabilities. The CVSS v3.1 base score is 4.3 (medium), reflecting the vulnerability's limited impact on confidentiality and availability but notable impact on integrity. No public exploits have been reported to date, but the ease of exploitation by any authenticated user with contributor privileges makes this a significant risk for multi-user WordPress environments. The lack of a patch link suggests that users should monitor the vendor's updates or apply manual mitigations.

Potential Impact

For European organizations, especially those relying on WordPress for content management and using the affected plugin, this vulnerability poses a risk to the integrity of website content and configuration. Unauthorized modification of plugin settings could lead to altered gallery displays, potential injection of malicious content, or disruption of user experience, which may damage brand reputation and user trust. While the vulnerability does not directly compromise sensitive data confidentiality or availability, it could be leveraged as a foothold for further attacks, such as privilege escalation or cross-site scripting, if combined with other vulnerabilities. Organizations with multi-user WordPress installations, such as media companies, educational institutions, and e-commerce sites, are particularly at risk. The impact is heightened in environments where Contributor-level access is widely granted or insufficiently monitored. Given the widespread use of WordPress across Europe, the vulnerability could affect a significant number of sites if unaddressed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first audit their WordPress user roles and restrict Contributor-level access to trusted users only. Limiting the number of users with editing capabilities reduces the attack surface. Administrators should monitor and review plugin settings regularly for unauthorized changes. Until an official patch is released, consider disabling or removing the vulnerable plugin if it is not essential. If the plugin is critical, implement web application firewall (WAF) rules to block unauthorized AJAX requests targeting the 'pgc_sgb_action_wizard' handler from non-administrative users. Additionally, applying the principle of least privilege to WordPress roles and employing multi-factor authentication can further reduce risk. Organizations should subscribe to vendor and security mailing lists to receive timely updates and patches. Finally, conducting regular security assessments and penetration tests focusing on WordPress plugins can help detect similar authorization issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-08T19:16:10.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5021

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/13/2025, 5:04:37 AM

Last updated: 12/14/2025, 6:54:37 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats