CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI Analysis
Technical Summary
CVE-2025-14288 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery' affecting all versions up to 3.3.0. The root cause is the plugin's use of the 'edit_posts' capability check instead of the more privileged 'manage_options' capability when handling the 'update_option' action in the AJAX handler 'pgc_sgb_action_wizard'. This improper authorization allows any authenticated user with Contributor-level permissions or higher to modify plugin settings arbitrarily, specifically those prefixed with 'pgc_sgb_*'. Since Contributors typically cannot manage plugin options, this represents a privilege escalation within the plugin's context. The vulnerability does not allow direct access to sensitive data or denial of service but compromises the integrity of plugin configurations, which could be leveraged to alter gallery content or behavior maliciously. The CVSS 3.1 score of 4.3 reflects a medium severity with network attack vector, low attack complexity, requiring privileges, no user interaction, and no impact on confidentiality or availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is commonly used in WordPress environments to manage multimedia galleries, making it a relevant threat for websites relying on this functionality.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the affected plugin. Attackers with Contributor-level access—often granted to content creators or editors—can alter plugin settings, potentially changing gallery displays, embedding malicious content, or disrupting user experience. While it does not directly expose sensitive data or cause service outages, unauthorized configuration changes can undermine trust and site reliability. Organizations with public-facing websites relying on this plugin for multimedia content presentation may face reputational damage or indirect security risks if attackers embed malicious media or links. The impact is heightened in sectors where website integrity is critical, such as media, e-commerce, education, and government portals. Since Contributor roles are commonly assigned to multiple users, the attack surface is broader than vulnerabilities requiring administrator privileges. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed WordPress plugins necessitates proactive mitigation to prevent potential exploitation.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately update the plugin to a patched version once available; if no patch exists yet, consider temporarily disabling the plugin or restricting its use. 2) Review and minimize the assignment of Contributor-level permissions, limiting them to trusted users only. 3) Implement strict role-based access controls (RBAC) in WordPress to ensure only necessary users have editing capabilities. 4) Monitor plugin settings for unauthorized changes by enabling logging and alerting on configuration modifications, especially those prefixed with 'pgc_sgb_*'. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'pgc_sgb_action_wizard' handler. 6) Conduct regular security audits of WordPress user roles and plugin configurations. 7) Educate content contributors about the risks of privilege misuse and encourage reporting of anomalous site behavior. These measures go beyond generic advice by focusing on access control tightening, monitoring, and proactive detection tailored to this vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14288: CWE-862 Missing Authorization in gallerycreator Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
Description
The Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery plugin for WordPress is vulnerable to unauthorized modification of plugin settings in all versions up to, and including, 3.3.0. This is due to the plugin using the `edit_posts` capability check instead of `manage_options` for the `update_option` action type in the `pgc_sgb_action_wizard` AJAX handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify arbitrary plugin settings prefixed with `pgc_sgb_*`.
AI-Powered Analysis
Technical Analysis
CVE-2025-14288 is a missing authorization vulnerability (CWE-862) found in the WordPress plugin 'Gallery Blocks with Lightbox. Image Gallery, (HTML5 video, YouTube, Vimeo) Video Gallery and Lightbox for native gallery' affecting all versions up to 3.3.0. The root cause is the plugin's use of the 'edit_posts' capability check instead of the more privileged 'manage_options' capability when handling the 'update_option' action in the AJAX handler 'pgc_sgb_action_wizard'. This improper authorization allows any authenticated user with Contributor-level permissions or higher to modify plugin settings arbitrarily, specifically those prefixed with 'pgc_sgb_*'. Since Contributors typically cannot manage plugin options, this represents a privilege escalation within the plugin's context. The vulnerability does not allow direct access to sensitive data or denial of service but compromises the integrity of plugin configurations, which could be leveraged to alter gallery content or behavior maliciously. The CVSS 3.1 score of 4.3 reflects a medium severity with network attack vector, low attack complexity, requiring privileges, no user interaction, and no impact on confidentiality or availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The plugin is commonly used in WordPress environments to manage multimedia galleries, making it a relevant threat for websites relying on this functionality.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the integrity of WordPress sites using the affected plugin. Attackers with Contributor-level access—often granted to content creators or editors—can alter plugin settings, potentially changing gallery displays, embedding malicious content, or disrupting user experience. While it does not directly expose sensitive data or cause service outages, unauthorized configuration changes can undermine trust and site reliability. Organizations with public-facing websites relying on this plugin for multimedia content presentation may face reputational damage or indirect security risks if attackers embed malicious media or links. The impact is heightened in sectors where website integrity is critical, such as media, e-commerce, education, and government portals. Since Contributor roles are commonly assigned to multiple users, the attack surface is broader than vulnerabilities requiring administrator privileges. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed WordPress plugins necessitates proactive mitigation to prevent potential exploitation.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately update the plugin to a patched version once available; if no patch exists yet, consider temporarily disabling the plugin or restricting its use. 2) Review and minimize the assignment of Contributor-level permissions, limiting them to trusted users only. 3) Implement strict role-based access controls (RBAC) in WordPress to ensure only necessary users have editing capabilities. 4) Monitor plugin settings for unauthorized changes by enabling logging and alerting on configuration modifications, especially those prefixed with 'pgc_sgb_*'. 5) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'pgc_sgb_action_wizard' handler. 6) Conduct regular security audits of WordPress user roles and plugin configurations. 7) Educate content contributors about the risks of privilege misuse and encourage reporting of anomalous site behavior. These measures go beyond generic advice by focusing on access control tightening, monitoring, and proactive detection tailored to this vulnerability's exploitation vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-08T19:16:10.267Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5021
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/20/2025, 6:15:57 AM
Last updated: 2/7/2026, 5:02:57 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.