Responsive Lightbox & Gallery Vulnerability (Medium) – CVE-2026-2479

Responsive Lightbox & Gallery Vulnerability (Medium) – CVE-2026-2479

by | Feb 24, 2026 | Plugins

Attack Vectors

Product: Responsive Lightbox & Gallery (WordPress plugin, slug: responsive-lightbox)

Vulnerability: CVE-2026-2479 (Medium severity; CVSS 5.0, vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N)

This issue affects Responsive Lightbox & Gallery versions up to and including 2.7.1. An attacker must already be logged in with at least Author permissions (or higher). Using the plugin’s remote library image upload functionality, the attacker can cause the website to make outbound web requests to attacker-chosen destinations (a Server-Side Request Forgery, or SSRF) originating from your WordPress environment.

Details and reference: CVE-2026-2479 record and Wordfence advisory.

Security Weakness

According to the published advisory, the vulnerability is caused by substring-based hostname validation in the plugin’s ajax_upload_image() function. The code uses strpos() to validate hostnames instead of performing a strict host comparison.

From a business-risk perspective, this is important because “looks-like” host checks can be bypassed, allowing requests to be sent to unintended destinations. In SSRF scenarios, that destination can include internal or restricted services that are not normally exposed to the public internet.

Remediation: Update Responsive Lightbox & Gallery to version 2.7.2 or newer (patched). This is the primary and recommended fix.

Technical or Business Impacts

Even at Medium severity, SSRF can create outsized business risk because it uses your site as a trusted “network position” to reach other systems. Successful exploitation may allow an authenticated attacker (Author+) to:

• Probe internal services: Identify internal endpoints and services that should not be reachable from the outside (potentially expanding an attacker’s path to more serious compromise).
• Access or influence internal data flows: The advisory notes the requests “can be used to query and modify information from internal services,” which can elevate risk beyond WordPress content changes.
• Increase breach and compliance exposure: If internal services include customer data, analytics pipelines, or marketing automation connectors, this can create privacy, contractual, or regulatory concerns—especially where sensitive data is involved.

Because the required privilege is Author+, this is also a governance issue: the more people or integrations that have publishing access, the more opportunities exist for compromised accounts to be used as an entry point.

Similar Attacks

SSRF is a common technique used in real-world incidents and high-profile vulnerabilities:

Capital One (2019) – SSRF used to access cloud resources (DOJ press release)
Microsoft Exchange Server (CVE-2021-26855) – SSRF component in widely exploited chain
Pulse Secure VPN (CVE-2019-11510) – widely abused vulnerability often discussed alongside SSRF-style access risks

If your organization relies on Responsive Lightbox & Gallery for marketing pages, landing pages, or media galleries, prioritize upgrading to 2.7.2+ and review who has Author access. For many organizations, the fastest risk reduction comes from patching plus tightening publishing roles and monitoring outbound requests from the web server environment.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers