Description
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-based hostname validation instead of strict host comparison in the `ajax_upload_image()` function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services.
Published: 2026-02-25
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The plugin contains an unsafe hostname validation that allows an attacker with Author or higher privileges to trigger HTTP requests to arbitrary hosts from the server. This Server‑Side Request Forgery can be used to read or modify data from internal services, leading to potential confidentiality and integrity violations. The flaw arises from using strpos for substring detection rather than strict host comparison, a classic input‑validation weakness identified as CWE‑918.

Affected Systems

Database: WordPress plugin Responsive Lightbox & Gallery. All releases up to and including 2.7.1 are affected. The vulnerability can be exploited only by users with Author role or higher, so any site that has author‑level accounts is susceptible. Upgraded or patched versions after 2.7.1 are not impacted.

Risk and Exploitability

The CVSS score of 5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of automated exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread active exploitation. However, attackers who can elevate to author privileges or are already authenticated can manually craft a request to supply an arbitrary URL, making the attack feasible in targeted environments. The primary attack vector is an authenticated host‑side request, relying on internal WordPress authorization to submit the malicious URL to the vulnerable endpoint.

Generated by OpenCVE AI on April 15, 2026 at 18:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Responsive Lightbox & Gallery to the latest released version, preferably beyond 2.7.1, where the hostname validation logic has been corrected.
  • If an upgrade is not immediately possible, remove or disable the remote library image upload feature provided by the plugin to block the vulnerable endpoint.
  • Restrict Author permissions on the site or enforce stricter role management so that only trusted users have the ability to trigger the remote upload function.
  • Configure network firewall or WordPress outbound request filters to block unexpected external HTTP requests originating from the site's web server.

Generated by OpenCVE AI on April 15, 2026 at 18:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Dfactory
Dfactory responsive Lightbox & Gallery
Wordpress
Wordpress wordpress
Vendors & Products Dfactory
Dfactory responsive Lightbox & Gallery
Wordpress
Wordpress wordpress

Wed, 25 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-based hostname validation instead of strict host comparison in the `ajax_upload_image()` function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services.
Title Responsive Lightbox & Gallery <= 2.7.1 - Authenticated (Author+) Server-Side Request Forgery via Remote Library Image Upload
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


Subscriptions

Dfactory Responsive Lightbox & Gallery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:17.545Z

Reserved: 2026-02-13T18:12:22.873Z

Link: CVE-2026-2479

cve-icon Vulnrichment

Updated: 2026-02-25T16:50:59.252Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T09:16:15.547

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2479

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:15:10Z

Weaknesses