Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0687: CWE-862 Missing Authorization in shahinurislam Meta-box GalleryMeta

0
Medium
VulnerabilityCVE-2026-0687cvecve-2026-0687cwe-862
Published: Sat Jan 24 2026 (01/24/2026, 08:26:34 UTC)
Source: CVE Database V5
Vendor/Project: shahinurislam
Product: Meta-box GalleryMeta

Description

CVE-2026-0687 is a medium-severity vulnerability in the Meta-box GalleryMeta WordPress plugin that allows authenticated users with Author-level privileges or higher to create and publish galleries without proper authorization checks. The flaw arises from a missing capability check on the 'mb_gallery' custom post type, enabling unauthorized modification of data. Exploitation requires no user interaction beyond having Author-level access, and it does not impact confidentiality or availability but affects data integrity. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should assess user roles carefully and apply strict access controls. Mitigation involves restricting Author-level permissions, monitoring plugin updates for patches, and implementing custom capability checks. Countries with high WordPress usage and significant web publishing activities, such as Germany, the UK, France, and the Netherlands, are more likely to be affected. Given the medium CVSS score of 4. 3, the threat is moderate but warrants attention to prevent unauthorized content manipulation.

AI-Powered Analysis

AILast updated: 01/24/2026, 08:51:04 UTC

Technical Analysis

CVE-2026-0687 identifies a missing authorization vulnerability (CWE-862) in the Meta-box GalleryMeta plugin for WordPress, affecting all versions up to and including 3.0.1. The vulnerability stems from the absence of a proper capability check on the 'mb_gallery' custom post type, which is used to manage galleries within WordPress. Authenticated users with Author-level access or higher can exploit this flaw to create and publish galleries without the necessary permissions, effectively bypassing intended access controls. This unauthorized modification capability can lead to integrity issues, such as the insertion of malicious or inappropriate content, potentially damaging the website's credibility or user trust. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (remote), with low attack complexity, requiring privileges (Author-level), no user interaction, and impacting integrity only. No known exploits have been reported in the wild, indicating limited active exploitation at this time. The vulnerability is particularly relevant for WordPress sites that rely on the Meta-box GalleryMeta plugin and assign Author-level roles to users who may not be fully trusted or vetted. Since the plugin is widely used for managing galleries, the scope of affected systems includes any WordPress installation with this plugin active. The lack of a patch at the time of reporting necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, the primary impact of CVE-2026-0687 is the potential unauthorized modification of web content managed via the Meta-box GalleryMeta plugin. This can lead to integrity breaches where attackers with Author-level access can publish unauthorized galleries, possibly containing malicious or misleading content. While confidentiality and availability are not directly affected, the reputational damage and potential downstream effects such as phishing or malware distribution through compromised galleries can be significant. Organizations in sectors with high reliance on WordPress for content management, such as media, education, and e-commerce, are particularly at risk. The vulnerability could also be leveraged in targeted attacks to deface websites or spread misinformation. Given the ease of exploitation by any authenticated Author-level user, insider threats or compromised Author accounts pose a notable risk. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2026-0687, European organizations should implement the following specific measures: 1) Restrict the assignment of Author-level roles to trusted users only, minimizing the number of users with privileges to create or publish galleries. 2) Employ role hardening by customizing WordPress capabilities to remove or limit 'mb_gallery' post type permissions from Author roles until a patch is available. 3) Monitor and audit user activities related to gallery creation and publication to detect unauthorized actions promptly. 4) Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'mb_gallery' post type endpoints. 5) Stay informed on plugin updates from the vendor and apply patches immediately once released. 6) Consider disabling or replacing the Meta-box GalleryMeta plugin if it is not critical or if no timely patch is forthcoming. 7) Implement multi-factor authentication (MFA) for all users with Author-level or higher privileges to reduce the risk of account compromise. 8) Conduct regular security awareness training focusing on the risks associated with elevated WordPress roles and plugin vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T19:28:25.648Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974846c4623b1157ca99ed9

Added to database: 1/24/2026, 8:35:56 AM

Last enriched: 1/24/2026, 8:51:04 AM

Last updated: 1/24/2026, 10:18:45 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats