Impact
The plugin contains a Server‑Side Request Forgery vulnerability that occurs when the function "get_image_size_by_url" processes user-supplied URLs without proper validation. An attacker who can authenticate with an Author-level role or higher can trigger the function to send arbitrary HTTP requests originating from the WordPress server. This can expose internal resources or allow modification of data exposed by those internal services, thereby compromising confidentiality and integrity within the network.
Affected Systems
Responsive Lightbox & Gallery plugin for WordPress, versions 2.5.3 and earlier are affected. Any site running these versions of the plugin is vulnerable.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, while an EPSS score of less than 1% reflects a low current exploitation probability. The vulnerability is not listed in CISA KEV. Exploitation requires the attacker to first obtain Author or higher privileges, after which they can craft requests to internal locations to retrieve or alter information.
OpenCVE Enrichment