Photo Gallery by 10Web – Mobile-Friendly Image Gallery Vulnerabilit…

Photo Gallery by 10Web – Mobile-Friendly Image Gallery Vulnerabilit…

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-27360 is a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 4.4) affecting Photo Gallery by 10Web – Mobile-Friendly Image Gallery (WordPress plugin slug: photo-gallery) in versions up to and including 1.8.38.

The attack requires an authenticated WordPress user with Editor-level permissions or higher. In practical terms, this means the risk is highest when multiple people (or third parties) can publish or manage content, such as internal marketing teams, agencies, contractors, or partner users.

Importantly, the vulnerability is reported to only affect (1) WordPress multisite installations and (2) sites where unfiltered_html has been disabled. If either of these conditions applies, a privileged user could inject script into a page, and that script would execute when others view the affected page.

Reference: CVE-2026-27360 record.

Security Weakness

The core issue is insufficient input sanitization and output escaping in the plugin, allowing stored XSS payloads to be saved and later rendered to visitors. Because it is stored, the harmful content can persist in your site and repeatedly trigger for anyone who accesses the impacted page(s).

While the attacker must already have Editor+ access (and the vulnerability has environmental constraints), it still represents a meaningful governance and insider-risk concern—especially for organizations with many content publishers, shared logins, or loosely controlled role assignments.

Remediation note: There is no known patch available at this time. Organizations should review the advisory details and implement mitigations consistent with their risk tolerance. In some cases, the most prudent path may be to uninstall the affected software and replace it with an alternative gallery solution.

Source: Wordfence vulnerability entry.

Technical or Business Impacts

Stored XSS can create business risk even when it requires an authenticated role. A successful injection may allow an attacker to:

• Compromise trust and brand: Inject content that changes what customers see (fake promos, altered CTAs, misleading messages), harming campaign integrity and brand credibility.
• Capture sensitive data: Interfere with user sessions in a viewer’s browser context, potentially enabling theft of data entered into forms or exposure of restricted information visible to logged-in staff.
• Enable downstream account abuse: If executives, marketing ops, or admins view an injected page while logged in, it can increase the risk of follow-on actions (for example, adding rogue users, modifying site settings, or planting additional malicious content through normal workflows).
• Create compliance and reporting issues: For regulated organizations, malicious script execution can become a reportable security incident if it results in data exposure, unauthorized tracking, or tampering with customer-facing disclosures.

Recommended risk controls include: limiting Editor/Admin access to only those who need it, eliminating shared accounts, auditing publishers and recent content changes, tightening approval workflows for content updates, and considering removal/replacement of the affected plugin given the lack of a patch.

Similar Attacks

Stored XSS has been used in real-world incidents to spread rapidly and damage trust. Examples include:

The “Samy” MySpace worm, which spread via stored XSS and demonstrated how quickly malicious scripts can propagate through user views and interactions.

The 2010 Twitter XSS incident (BBC coverage), where injected scripts caused widespread unwanted posts and highlighted reputational impact when customers see unexpected behavior on a trusted platform.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers