Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery Vulne…

Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery Vulne…

by | Mar 18, 2026 | Plugins

Attack Vectors

CVE-2026-1463 is a High-severity issue (CVSS 8.8, vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) affecting the WordPress plugin Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery (slug: nextgen-gallery).

The vulnerability is authenticated, meaning the attacker must have a valid WordPress account with Author-level access or higher. In practical terms, this can be exploited via the plugin’s gallery shortcodes by manipulating the template parameter.

Because Author permissions are commonly used for content publishing workflows, this is especially relevant for organizations with multiple content contributors, agency accounts, contractors, or shared editorial access.

Reference: CVE record.

Security Weakness

NextGEN Gallery is vulnerable to Local File Inclusion (LFI) in versions up to and including 4.0.3, via the template parameter in gallery shortcodes (as reported by Wordfence).

LFI weaknesses can allow an attacker to force the application to load local files from the server. In this case, it may enable inclusion and execution of arbitrary .php files that exist on the server, which can lead to bypassing intended access controls and exposing sensitive information.

Where the environment allows it (for example, if a .php file can be placed on the server and then included), LFI can become a pathway to broader compromise through execution of code contained in those files.

Remediation: Update to NextGEN Gallery 4.0.5 or newer (patched). Source: Wordfence vulnerability advisory.

Technical or Business Impacts

For business leaders, the risk is not limited to a “plugin bug.” With a High severity score and low attack complexity, this issue can materially increase the likelihood of a security incident if an Author (or higher) account is compromised, misused, or granted too broadly.

Potential impacts include:

Data exposure: The ability to include server-side files can lead to leakage of sensitive configuration data or other protected information, increasing privacy and compliance risk.

Operational disruption: If the vulnerability is leveraged to execute server-side code (where applicable), it can result in site defacement, malware insertion, SEO spam, or downtime—directly affecting campaigns, lead capture, and brand trust.

Loss of control over publishing and approvals: Because the attack path involves authenticated roles, editorial workflows and user access governance become part of the security boundary. Weak role management, shared logins, or unused accounts can raise risk.

Similar Attacks: Local file inclusion and related path traversal issues have been used in major incidents across the industry, including CVE-2021-41773 (Apache HTTP Server path traversal) and CVE-2021-42013 (Apache HTTP Server traversal leading to potential code execution).

Priority actions for risk reduction: upgrade NextGEN Gallery to 4.0.5+, review and minimize Author+ access, remove dormant accounts, and ensure strong authentication controls for publishing roles.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers