CVE-2025-14288

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to modify plugin settings for the Gallery Blocks with Lightbox plugin. Attackers can change arbitrary plugin settings prefixed with 'pgc_sgb_*', potentially disrupting gallery functionality or enabling further attacks. All WordPress sites using this plugin up to version 3.3.0 are affected.

💻 Affected Systems

Products:
  • Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery WordPress plugin
Versions: All versions up to and including 3.3.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with Contributor role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disable security features, modify gallery behavior to serve malicious content, or create persistent backdoors through plugin configuration changes.

🟠

Likely Case

Attackers modify gallery settings to disrupt website functionality, inject unwanted content, or degrade user experience.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor configuration changes that can be quickly reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. The vulnerability is in a publicly accessible AJAX handler with insufficient capability checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3418101/simply-gallery-block/trunk/plugin.php?old=3415010&old_path=simply-gallery-block%2Ftrunk%2Fplugin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Gallery Blocks with Lightbox' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.3.1+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily remove Contributor and Author roles from untrusted users until patch is applied.

Disable Plugin

all

Deactivate the vulnerable plugin if gallery functionality is not critical.

🧯 If You Can't Patch

  • Implement strict user role management and limit Contributor accounts to trusted personnel only.
  • Monitor WordPress admin logs for unauthorized plugin setting changes and implement web application firewall rules to block suspicious AJAX requests.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins. If 'Gallery Blocks with Lightbox' version is 3.3.0 or lower, the site is vulnerable.

Check Version:

wp plugin list --name='Gallery Blocks with Lightbox' --field=version (requires WP-CLI)

Verify Fix Applied:

After updating, verify plugin version shows 3.3.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to admin-ajax.php with action 'pgc_sgb_action_wizard' from non-admin users
  • Plugin setting changes in WordPress logs from users with insufficient privileges

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=pgc_sgb_action_wizard' parameter from non-admin IP addresses

SIEM Query:

source="wordpress.log" AND "pgc_sgb_action_wizard" AND (user_role="contributor" OR user_role="author")

🔗 References

📤 Share & Export