Picture Gallery – Frontend Image Uploads, AJAX Photo List Vulnerabi…

Picture Gallery – Frontend Image Uploads, AJAX Photo List Vulnerabi…

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2025-26581 is a medium-severity Stored Cross-Site Scripting (XSS) issue affecting the WordPress plugin Picture Gallery – Frontend Image Uploads, AJAX Photo List (slug: picture-gallery) in versions up to and including 1.6.3.

Because the vulnerability is unauthenticated, an external attacker can attempt to submit specially crafted input through the plugin’s public-facing functionality (for example, where images or related fields are accepted). If the malicious content is stored and later displayed, it can execute in a visitor’s browser when they load the affected page. The CVSS score is 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), indicating it is reachable over the network with low attack complexity, requires no login, and relies on a user viewing an affected page.

Reference: CVE-2025-26581 record. Additional vendor/third-party analysis: Wordfence vulnerability entry.

Security Weakness

The reported root cause is insufficient input sanitization and output escaping in the plugin, which can allow attacker-supplied content to be stored and then rendered to other users as active script content.

This matters from a business perspective because Stored XSS typically turns normal web pages into a delivery mechanism for browser-based attacks. Even if the attacker never accesses your admin area directly, the script can execute in the context of your site when a staff member or customer views the compromised page.

Remediation: Update Picture Gallery – Frontend Image Uploads, AJAX Photo List to version 1.6.4 or newer (patched). After updating, consider reviewing recent gallery submissions/content for anything unexpected (especially if your site allows public uploads) and rotate any credentials if you suspect active abuse.

Technical or Business Impacts

Stored XSS can create real business risk beyond “a website bug.” Potential outcomes include theft of session tokens (which can lead to account takeover in certain situations), unauthorized actions performed in a logged-in user’s browser, and misleading or fraudulent on-site content that damages trust.

For marketing and leadership teams, the most common impacts are brand harm (customers seeing defaced pages, pop-ups, or redirects), lead and revenue loss (campaign landing pages becoming untrustworthy or unusable), and compliance exposure if customer data or authenticated user activity is affected. Even when the CVSS impact is rated “low” for confidentiality and integrity, the downstream consequences can be significant because the attack executes in real user sessions.

Operationally, incidents like this can also trigger unplanned costs: emergency patching, website downtime, campaign pauses, incident response support, and communications work (customer notifications or partner escalations), especially if the attack is visible to the public.

Similar Attacks

Stored XSS is a recurring issue across the web ecosystem, including content-management platforms. Here are a few widely reported examples to illustrate how common—and disruptive—these flaws can be:

CVE-2019-16759 (vBulletin) — a widely publicized vulnerability in a major forum platform that drove large-scale scanning and exploitation activity.
CVE-2021-44228 (Log4Shell) — while not XSS, it is a well-known example of how quickly internet-reachable software flaws can be weaponized and lead to major business disruption.
CVE-2020-11022 (jQuery) — an example of how web-layer injection issues can arise in widely used components, affecting many downstream sites and applications.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers