CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI Analysis
Technical Summary
CVE-2025-14288 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery,' affecting all versions up to and including 3.3.0. The root cause is the plugin's use of the 'edit_posts' capability check instead of the more restrictive 'manage_options' capability when handling the 'update_option' action in the 'pgc_sgb_action_wizard' AJAX handler. This improper authorization allows any authenticated user with at least Contributor-level privileges to modify arbitrary plugin settings that begin with the prefix 'pgc_sgb_*'. Since Contributors typically cannot manage plugin options, this represents a privilege escalation within the plugin's context. The vulnerability does not expose confidential data or affect system availability but compromises the integrity of plugin settings, potentially enabling attackers to alter gallery behavior or introduce malicious configurations. The attack vector is remote and network-based, requiring authentication but no additional user interaction. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin used globally means it could be targeted in the future. The issue is due to a common authorization misconfiguration, emphasizing the importance of correct capability checks in WordPress plugins.
Potential Impact
The primary impact of CVE-2025-14288 is unauthorized modification of plugin settings by users with Contributor-level access or higher. This can lead to integrity violations where attackers alter gallery configurations, potentially enabling malicious content display, bypassing content restrictions, or introducing vectors for further attacks such as cross-site scripting or phishing via manipulated galleries. While confidentiality and availability are not directly affected, the altered settings could degrade user trust or site functionality. For organizations relying on this plugin, especially those with multiple contributors or editors, the risk includes unauthorized changes that may go unnoticed and could be leveraged for broader attacks or reputational damage. Since the vulnerability requires authenticated access, it is less likely to be exploited by external unauthenticated attackers but poses a significant risk in environments with many users or weak account controls. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as the plugin is widely used in WordPress sites worldwide.
Mitigation Recommendations
To mitigate CVE-2025-14288, organizations should immediately update the plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher user roles from accessing or invoking the vulnerable AJAX handler by implementing custom capability checks or using security plugins that can block unauthorized AJAX requests. Review and tighten user role assignments to ensure only trusted users have Contributor or higher privileges. Employ web application firewalls (WAFs) with rules targeting suspicious AJAX requests related to 'pgc_sgb_action_wizard'. Monitor plugin settings for unexpected changes and audit user activities regularly. Consider temporarily disabling the plugin if it is not critical to site functionality. Developers should correct the authorization check by replacing 'edit_posts' with 'manage_options' for the update_option action to ensure only administrators can modify plugin settings. Additionally, implement logging for all changes to plugin options to detect unauthorized modifications promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
Description
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14288 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery,' affecting all versions up to and including 3.3.0. The root cause is the plugin's use of the 'edit_posts' capability check instead of the more restrictive 'manage_options' capability when handling the 'update_option' action in the 'pgc_sgb_action_wizard' AJAX handler. This improper authorization allows any authenticated user with at least Contributor-level privileges to modify arbitrary plugin settings that begin with the prefix 'pgc_sgb_*'. Since Contributors typically cannot manage plugin options, this represents a privilege escalation within the plugin's context. The vulnerability does not expose confidential data or affect system availability but compromises the integrity of plugin settings, potentially enabling attackers to alter gallery behavior or introduce malicious configurations. The attack vector is remote and network-based, requiring authentication but no additional user interaction. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin used globally means it could be targeted in the future. The issue is due to a common authorization misconfiguration, emphasizing the importance of correct capability checks in WordPress plugins.
Potential Impact
The primary impact of CVE-2025-14288 is unauthorized modification of plugin settings by users with Contributor-level access or higher. This can lead to integrity violations where attackers alter gallery configurations, potentially enabling malicious content display, bypassing content restrictions, or introducing vectors for further attacks such as cross-site scripting or phishing via manipulated galleries. While confidentiality and availability are not directly affected, the altered settings could degrade user trust or site functionality. For organizations relying on this plugin, especially those with multiple contributors or editors, the risk includes unauthorized changes that may go unnoticed and could be leveraged for broader attacks or reputational damage. Since the vulnerability requires authenticated access, it is less likely to be exploited by external unauthenticated attackers but poses a significant risk in environments with many users or weak account controls. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as the plugin is widely used in WordPress sites worldwide.
Mitigation Recommendations
To mitigate CVE-2025-14288, organizations should immediately update the plugin to a patched version once available. Until a patch is released, restrict Contributor-level and higher user roles from accessing or invoking the vulnerable AJAX handler by implementing custom capability checks or using security plugins that can block unauthorized AJAX requests. Review and tighten user role assignments to ensure only trusted users have Contributor or higher privileges. Employ web application firewalls (WAFs) with rules targeting suspicious AJAX requests related to 'pgc_sgb_action_wizard'. Monitor plugin settings for unexpected changes and audit user activities regularly. Consider temporarily disabling the plugin if it is not critical to site functionality. Developers should correct the authorization check by replacing 'edit_posts' with 'manage_options' for the update_option action to ensure only administrators can modify plugin settings. Additionally, implement logging for all changes to plugin options to detect unauthorized modifications promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-08T19:16:10.267Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5021
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 2/27/2026, 11:03:44 AM
Last updated: 3/24/2026, 7:46:31 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.