CVE-2024-13814

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Global Gallery plugin. Attackers can leverage this to perform actions beyond their intended permissions, potentially leading to privilege escalation or data exposure. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Global Gallery - WordPress Responsive Gallery
Versions: All versions up to and including 9.1.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with plugin enabled and at least one Subscriber-level user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute shortcodes that allow file uploads, code execution, or database manipulation, leading to complete site compromise.

🟠

Likely Case

Attackers use shortcodes to display sensitive content, modify site appearance, or perform limited administrative actions.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor content manipulation by legitimate users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.6 or later

Vendor Advisory: https://lcweb.it/global-gallery-wordpress-photogallery-plugin/changelog/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Global Gallery plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from vendor and upload manually.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Global Gallery plugin until patched.

wp plugin deactivate global-gallery

Restrict User Registration

all

Disable new user registration to prevent attacker account creation.

Settings > General > Membership: Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement strict user role management and review all Subscriber+ accounts
  • Monitor WordPress logs for unusual shortcode execution patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Global Gallery version number

Check Version:

wp plugin list --name=global-gallery --field=version

Verify Fix Applied:

Confirm plugin version is 9.1.6 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual do_shortcode calls in WordPress debug logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • HTTP POST requests to wp-admin/admin-ajax.php with shortcode parameters

SIEM Query:

source="wordpress.log" AND "do_shortcode" AND NOT user_role="administrator"

🔗 References

📤 Share & Export