Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15524: CWE-862 Missing Authorization in fooplugins Gallery by FooGallery

0
Medium
VulnerabilityCVE-2025-15524cvecve-2025-15524cwe-862
Published: Wed Feb 11 2026 (02/11/2026, 01:23:33 UTC)
Source: CVE Database V5
Vendor/Project: fooplugins
Product: Gallery by FooGallery

Description

The Gallery by FooGallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax_get_gallery_info() function in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve metadata (name, image count, thumbnail URL) of private, draft, and password-protected galleries by enumerating gallery IDs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:03:20 UTC

Technical Analysis

The vulnerability CVE-2025-15524 affects the Gallery by FooGallery plugin for WordPress, specifically versions up to and including 3.1.9. The root cause is a missing capability check in the ajax_get_gallery_info() function, which is responsible for retrieving gallery metadata via AJAX requests. This flaw allows any authenticated user with at least Subscriber-level privileges to enumerate gallery IDs and retrieve metadata for galleries that are private, in draft status, or protected by passwords. The leaked metadata includes the gallery's name, the number of images it contains, and the thumbnail URL. Because the authorization check is absent, the plugin fails to restrict access to sensitive gallery information, violating the principle of least privilege. The vulnerability is remotely exploitable over the network without requiring user interaction beyond login. The CVSS v3.1 base score is 4.3, reflecting low impact on confidentiality and no impact on integrity or availability. No patches or fixes are currently linked, and no active exploitation has been reported. The vulnerability is classified under CWE-862 (Missing Authorization).

Potential Impact

This vulnerability primarily impacts confidentiality by exposing metadata of private and protected galleries to unauthorized users with minimal privileges. While the leaked data does not include the actual images or their content, the metadata could reveal sensitive organizational or personal information, such as gallery names that might indicate project details or private events. Attackers could leverage this information for social engineering, reconnaissance, or to identify targets for further attacks. Since the vulnerability requires only Subscriber-level access, it lowers the barrier for internal threat actors or compromised low-privilege accounts to gather sensitive information. The lack of impact on integrity and availability limits the scope to information disclosure, but this can still have reputational and privacy consequences for organizations. WordPress sites using this plugin, especially those hosting sensitive or confidential galleries, are at risk until mitigations or patches are applied.

Mitigation Recommendations

Organizations should immediately verify if they use the Gallery by FooGallery plugin and identify the version in use. Since no official patch links are provided, administrators should consider the following mitigations: 1) Restrict Subscriber-level accounts from accessing the plugin's AJAX endpoints by implementing custom capability checks or web application firewall (WAF) rules that block unauthorized AJAX requests to ajax_get_gallery_info(). 2) Temporarily disable or deactivate the FooGallery plugin if the galleries contain sensitive information and no patch is available. 3) Monitor logs for unusual access patterns or enumeration attempts targeting gallery IDs. 4) Limit the number of users with Subscriber or higher privileges to trusted personnel only. 5) Stay alert for official patches or updates from the vendor and apply them promptly once released. 6) Consider isolating sensitive galleries or migrating to alternative gallery plugins with robust authorization controls. 7) Conduct regular security audits on WordPress plugins to detect missing authorization issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-14T22:20:55.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698bdf6c4b57a58fa14457fe

Added to database: 2/11/2026, 1:46:20 AM

Last enriched: 2/27/2026, 12:03:20 PM

Last updated: 4/5/2026, 12:29:07 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses