Gallery by FooGallery Vulnerability (Medium) – CVE-2026-25363

Gallery by FooGallery Vulnerability (Medium) – CVE-2026-25363

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25363 is a Medium-severity missing-authorization issue (CVSS 4.3, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) affecting Gallery by FooGallery (FooGallery) for WordPress (plugin slug: foogallery) in versions up to and including 3.1.11.

The key business risk is that this can be exploited remotely by an authenticated user with contributor-level access (or higher). No user interaction is required, which can make abuse harder to detect if an account is compromised or a low-privileged internal account is misused.

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2026-25363

Security Weakness

This vulnerability is caused by a missing capability check on a plugin function in FooGallery versions up to 3.1.11. In plain terms, the plugin does not consistently verify whether the logged-in user is actually authorized to perform a specific action before allowing it.

While the published summary does not specify the exact unauthorized action, the underlying issue is a common governance/control gap: roles and permissions are not being enforced as expected. That increases exposure when accounts are shared, when contractor access persists longer than intended, or when a low-privilege account is taken over via phishing or credential reuse.

Technical or Business Impacts

The CVSS impact rating indicates limited integrity impact (and no stated confidentiality or availability impact). Practically, that means an authenticated attacker could potentially trigger an unauthorized change within the WordPress environment where FooGallery is used, depending on how your site is configured and how that affected function is used operationally.

For marketing leaders and executives, the most likely business consequences include loss of content integrity (unexpected or unapproved site changes), brand and trust risk (customers seeing incorrect or altered content), and compliance/process risk if your organization relies on defined approval workflows for publishing or asset management.

Remediation: update Gallery by FooGallery (FooGallery) to version 3.1.13 or newer patched version as recommended by the vendor/community intelligence source. Source reference: Wordfence vulnerability record.

Similar Attacks

Missing authorization (often grouped under “broken access control”) is a recurring cause of real-world incidents across many platforms. A few well-documented examples include:

CVE-2023-22515 (Atlassian Confluence) — an improper authorization issue that enabled high-impact, unauthorized outcomes in affected environments.
CVE-2023-27532 (Veeam Backup & Replication) — an authorization-related weakness that attackers could leverage to access protected systems/data.
CVE-2023-23752 (Joomla!) — an access control flaw that led to unauthorized information exposure in certain configurations.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers