o2s gallery Vulnerability (Medium) –

o2s gallery Vulnerability (Medium) –

by | Feb 26, 2026 | Plugins

Attack Vectors

The o2s gallery WordPress plugin (o2s-gallery) is affected by a Medium-severity reflected Cross-Site Scripting (XSS) vulnerability in versions 1.0 and earlier (CVSS 6.1, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

This issue can be triggered by an unauthenticated attacker by crafting a link or request that places malicious code into the button_text parameter. Because it is reflected XSS, the attack typically succeeds when a victim clicks the link or otherwise loads the crafted page (for example, through an email, chat message, or a marketing/CRM workflow that surfaces the URL to staff).

Business teams should treat this as a credible risk because it can be aimed at employees (marketing, finance, operations, compliance) who already have access to internal tools and WordPress admin areas—making social engineering campaigns more effective.

Security Weakness

According to the published advisory, the vulnerability exists due to insufficient input sanitization and insufficient output escaping of the button_text parameter. In plain terms: the plugin does not reliably filter and safely display user-controlled text, allowing a browser to interpret attacker-supplied content as executable script.

The recommended remediation is to update o2s gallery to version 1.1 or later, where the issue is patched. Source: Wordfence vulnerability advisory.

Technical or Business Impacts

While this is rated Medium (and does not directly indicate server takeover), reflected XSS can still create meaningful business exposure. If a staff member is tricked into opening a malicious link, an attacker may be able to run script in that user’s browser within the context of your site’s session.

Potential outcomes include: credential/session theft (especially if the victim is logged in), unauthorized actions performed as the victim, malicious redirects to phishing pages, and content or brand manipulation that impacts campaign integrity and customer trust. For regulated organizations, this can also trigger incident response and compliance reporting obligations if user or customer data is exposed.

Practical risk management steps: prioritize the plugin update to 1.1+, review where the plugin is used (especially on high-traffic landing pages), and ensure staff are trained to treat unexpected “site fix” or “preview this campaign” links as suspicious.

Similar Attacks

Reflected XSS has a long history of being used for account compromise and large-scale social engineering. Notable examples include the MySpace “Samy” worm (a famous XSS-driven propagation event), the 2010 Twitter onMouseOver XSS incident, and repeated real-world abuse patterns documented across web platforms where attackers use crafted links to run scripts in victims’ browsers.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers