CVE-2024-37542

5.4 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WpDevArt Responsive Image Gallery, Gallery Album WordPress plugin. It allows unauthorized users to perform actions that should require authentication, potentially modifying gallery content. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WpDevArt Responsive Image Gallery, Gallery Album WordPress plugin
Versions: n/a through 2.0.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could modify, delete, or inject malicious content into galleries, potentially leading to site defacement or malware distribution.

🟠

Likely Case

Unauthorized users could alter gallery images, videos, or settings, disrupting site functionality and content integrity.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized administrators could modify gallery content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-broken-access-control-vulnerability-2?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Responsive Image Gallery, Gallery Album'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.0.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched version is available

wp plugin deactivate gallery-album

Restrict admin access

all

Limit WordPress admin access to trusted IP addresses only

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative gallery solutions
  • Implement web application firewall rules to block unauthorized gallery modification requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Responsive Image Gallery, Gallery Album' version

Check Version:

wp plugin get gallery-album --field=version

Verify Fix Applied:

Verify plugin version is 2.0.4 or higher in WordPress admin plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to gallery admin endpoints
  • Unexpected gallery content modifications from unauthenticated users

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with gallery-related actions from unauthenticated sources

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action CONTAINS "gallery") AND user="-"

🔗 References

📤 Share & Export