PhotoStack Gallery Vulnerability (High) – CVE-2026-2024

PhotoStack Gallery Vulnerability (High) – CVE-2026-2024

by | Feb 13, 2026 | Plugins

Attack Vectors

PhotoStack Gallery (WordPress plugin slug: photostack-gallery) has a High-severity vulnerability (CVSS 7.5) identified as CVE-2026-2024. The issue can be exploited without authentication, meaning an external attacker may be able to target a site even if they do not have a user account.

The attack path involves sending crafted requests that manipulate the postid parameter. Because this can be done remotely over the internet and does not require user interaction, it increases the urgency for public-facing sites and brands that depend on uptime and trust.

Security Weakness

In PhotoStack Gallery versions 0.4.1 and earlier, the plugin does not sufficiently protect database queries from unsafe input. Specifically, it fails to properly escape the user-supplied postid parameter and does not adequately prepare the SQL query, allowing an attacker to alter the query logic.

As documented by Wordfence, this weakness can allow an unauthenticated attacker to append additional SQL into existing queries and potentially extract sensitive information stored in the WordPress database. Source: Wordfence vulnerability record.

Remediation note: there is currently no known patch available. Organizations should evaluate mitigations based on risk tolerance, and for many businesses the safest option may be to uninstall the affected plugin and replace it with an alternative.

Technical or Business Impacts

The primary risk is data exposure. If an attacker can retrieve sensitive database content, the impact may include access to customer or prospect information, internal site data, and other records that support marketing operations and digital commerce. Even without direct service disruption, a data incident can trigger costly response activities and loss of stakeholder confidence.

From a business perspective, this can translate into brand damage, regulatory and contractual obligations (including breach notifications and compliance reviews), and increased scrutiny from partners and customers. For marketing leaders, the downstream effects can include campaign interruptions, reduced conversion rates due to trust concerns, and delayed launches while security teams investigate and contain the issue.

Recommended actions (given no patch): inventory where PhotoStack Gallery is installed; consider uninstalling and replacing it; restrict exposure where possible (for example, limiting access to affected functionality); increase monitoring for unusual requests and database activity; and ensure you have recent, tested backups and a defined incident-response path for rapid containment.

Similar attacks: SQL injection has been used in major breaches to extract sensitive data, including the StubHub-related hacking case (U.S. Department of Justice), the Heartland Payment Systems breach, and the Sony PlayStation Network incident.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers