Gallery by FooGallery Vulnerability (Medium) – CVE-2026-25363

Gallery by FooGallery Vulnerability (Medium) – CVE-2026-25363

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25363 affects the WordPress plugin Gallery by FooGallery (slug: foogallery) up to and including version 3.1.11. The issue is categorized as Medium severity (CVSS 4.3, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), meaning it can be exploited remotely over the network with low complexity.

The key requirement is that the attacker must be authenticated with at least contributor-level access (or higher). In practical terms, this raises risk for organizations that accept user registrations, operate multi-author blogs, run community or partner portals, or have many internal users with non-admin accounts.

Security Weakness

The vulnerability is described as a missing authorization (capability) check on a plugin function in FooGallery versions up to 3.1.11. In business terms, this means the plugin may allow certain actions to be performed by logged-in users who should not have permission to do so under normal role-based access controls.

Because the advisory specifies “an unauthorized action” without detailing the exact action, the safest assumption for risk management is that a contributor-level user could potentially trigger functionality intended only for more trusted roles.

Technical or Business Impacts

While the CVSS vector indicates no direct confidentiality impact and no availability impact, it does indicate a low integrity impact. For marketing and business stakeholders, integrity issues typically translate into concerns such as unauthorized changes that could affect site content presentation, gallery-related assets or settings, brand experience, campaign landing pages, or workflow controls—depending on what the unauthorized action enables in your environment.

This matters most when your WordPress site supports revenue-generating activities (lead generation, ecommerce support, partner enablement) or regulated workflows where content accuracy and change control are important. Even a “low” integrity impact can create real costs: incident response time, operational disruption, QA rework, potential reputational impact, and compliance headaches if content approvals are bypassed.

Remediation note: The source indicates no known patch is available at this time. Based on your organization’s risk tolerance, you may consider mitigations such as removing/uninstalling Gallery by FooGallery and replacing it with an alternative, reducing the number of contributor-level accounts, tightening role assignments, and increasing monitoring of plugin-related actions and administrative changes.

Similar Attacks

Authorization weaknesses like missing capability checks are a common theme in WordPress plugin incidents because they can allow lower-privileged users to perform actions intended for administrators. For reference, here are a few well-documented examples of WordPress plugin vulnerabilities where authorization or access control failures were central to the risk:

CISA alert (May 2023) adding WordPress plugin vulnerabilities (including access control issues) to the Known Exploited Vulnerabilities catalog
Wordfence coverage: File Manager plugin vulnerabilities and real-world exploitation
CVE record for CVE-2026-25363 (FooGallery missing authorization)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers