Impact
The NextGEN Gallery plugin for WordPress contains a Local File Inclusion vulnerability in the 'template' parameter of gallery shortcodes. Authenticated attackers with Author-level access can force the plugin to include and execute arbitrary .php files stored on the server. This can lead to execution of any PHP code, enabling bypass of access controls, theft of sensitive data, or full code execution where .php uploads are permitted. The weakness corresponds to CWE-98.
Affected Systems
This issue affects the NextGEN Gallery plugin (vendor smub) for WordPress in all versions up to and including 4.0.3, as documented in the vendor references. WordPress sites running the affected plugin with Authors or higher roles are at risk.
Risk and Exploitability
The CVSS score is 8.8 indicating high severity. EPSS is not available; KEV is not listed. The vulnerability requires authenticated access, meaning an attacker must possess Author or higher privileges to exploit it. If such credentials exist, the attacker can supply a crafted 'template' value to include arbitrary PHP, potentially leading to server-side code execution. Administrators should treat this as a high risk due to the local code execution capability.
OpenCVE Enrichment