CVE-2025-10637

5.3 MEDIUM

📋 TL;DR

The Social Feed Gallery WordPress plugin versions ≤4.9.2 have an authorization bypass vulnerability that allows unauthenticated attackers to access Instagram profile and media data from any account connected to the site. This affects all WordPress sites using vulnerable versions of the plugin. Attackers can exfiltrate sensitive Instagram data without any authentication.

💻 Affected Systems

Products:
  • Social Feed Gallery (insta-gallery) WordPress plugin
Versions: All versions ≤ 4.9.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when plugin is active and has connected Instagram accounts.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers harvest all Instagram profile data, media content, and metadata from connected accounts, potentially exposing private user information, business data, or copyrighted material.

🟠

Likely Case

Attackers scrape Instagram profile information and media data for reconnaissance, data collection, or to bypass Instagram's API limitations.

🟢

If Mitigated

With proper authorization checks, only authenticated users with appropriate permissions can access Instagram data through the plugin.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests to vulnerable REST endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.9.3 or later

Vendor Advisory: https://wordpress.org/plugins/insta-gallery/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Social Feed Gallery' plugin. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable REST endpoint

WordPress

Add code to functions.php to disable the vulnerable REST endpoint

add_filter('rest_endpoints', function($endpoints) { if (isset($endpoints['/wp-json/insta-gallery/v1/user-profile'])) { unset($endpoints['/wp-json/insta-gallery/v1/user-profile']); } return $endpoints; });

🧯 If You Can't Patch

  • Disable the Social Feed Gallery plugin immediately
  • Remove Instagram account connections from the plugin settings

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Social Feed Gallery version number

Check Version:

wp plugin list --name=insta-gallery --field=version

Verify Fix Applied:

Verify plugin version is 4.9.3 or higher, then test REST endpoint /wp-json/insta-gallery/v1/user-profile returns 401/403 for unauthenticated requests

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /wp-json/insta-gallery/v1/user-profile from unauthenticated IPs
  • Unusual traffic patterns to Instagram API endpoints

Network Indicators:

  • HTTP GET requests to /wp-json/insta-gallery/v1/user-profile without authentication headers
  • Outbound connections to Instagram API from WordPress server

SIEM Query:

source="wordpress.log" AND uri="/wp-json/insta-gallery/v1/user-profile" AND status=200 AND NOT auth_token=*

🔗 References

📤 Share & Export