Modula Image Gallery – Photo Grid & Video Gallery Vulnerability (Me…

Modula Image Gallery – Photo Grid & Video Gallery Vulnerability (Me…

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2026-24939 affects the WordPress plugin Modula Image Gallery – Photo Grid & Video Gallery (slug: modula-best-grid-gallery) in versions up to and including 2.13.6. This is a Medium severity issue (CVSS 4.3).

The primary risk comes from authenticated misuse: an attacker who already has a legitimate login with Subscriber-level access or higher may be able to trigger an unauthorized action because the plugin lacks a required authorization check on a function. In practical terms, this means a low-privilege user account could potentially do something that should have been limited to higher-privilege roles.

Security Weakness

The root cause is a missing capability check (also described as missing authorization) within the plugin. WordPress plugins are expected to verify that a logged-in user has the right permissions before allowing sensitive actions. In Modula Image Gallery versions ≤ 2.13.6, one function does not enforce that permission check, opening the door for unauthorized actions by authenticated users.

While this is not described as a full site takeover, it is still a meaningful control failure—especially for organizations that allow many users to register, run membership programs, or provide customer portals where Subscriber accounts are common.

Technical or Business Impacts

For executives and marketing leadership, the key risk is not “hacking from the outside” but privilege misuse from the inside. If an attacker gains access to any low-privilege user account (or uses their own Subscriber account on a public site), they may be able to perform actions beyond what that role should allow. Even limited unauthorized changes can create brand, compliance, and operational risk.

Potential business impacts include content or site integrity issues (unauthorized changes that reduce trust), campaign disruption (unexpected edits or configuration changes affecting landing pages and conversion flows), and audit/compliance concerns (weak access controls can be flagged during vendor reviews or internal risk assessments). The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) indicates the issue is reachable over the network, requires a logged-in account, and primarily affects integrity rather than confidentiality or availability.

Recommended action: update Modula Image Gallery to version 2.13.7 or newer (patched). After updating, review user roles and remove unnecessary Subscriber accounts, especially on sites where public registration is enabled.

Similar Attacks

Missing authorization checks in WordPress plugins are a common pattern leveraged by attackers—especially when a site has many low-privilege accounts. For context, here are a few real examples of access-control issues in popular plugins (for awareness and benchmarking):

CVE-2021-24237 (WooCommerce Jetsack): missing authorization leading to unauthorized actions
CVE-2021-24741 (WP User Avatar): improper permission checks enabling unauthorized changes
CVE-2020-25213 (File Manager): authorization failures contributing to widespread exploitation

For more details on this specific issue, reference the official CVE entry and the vendor advisory source: CVE-2026-24939 and Wordfence vulnerability record.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers