Impact
The Envira Gallery plugin for WordPress has a missing capability check on the "/envira-convert/v1/bulk-convert" REST API endpoint, which allows any authenticated user with contributor-level access or higher to convert galleries into Envira galleries. This provides unauthorized modification of gallery data, affecting content integrity and potentially altering site appearance or navigation.
Affected Systems
All versions of the Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More plugin up to and including 1.11.0 are affected. The vulnerability applies to the WordPress plugin delivered by smub, and impacts both the full and lite distributions as indicated by the reference paths.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity; the EPSS score is below 1%, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is authenticated access from a contributor or higher role, requiring nothing beyond normal WordPress credentials. Exploitation simply triggers the bulk convert endpoint, allowing the attacker to alter gallery content without further system compromise.
OpenCVE Enrichment