CVE-2026-1463
HIGH
8,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.3 via the 'template' parameter in gallery shortcodes. This makes it possible for authenticated attackers, with Author-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
DraftCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Applicable Platforms
Languages:
PHP
Technologies:
Web Based, Web Server
https://plugins.trac.wordpress.org/browser/nextgen-gallery/tags/4.0.3/src/Displ…
https://plugins.trac.wordpress.org/browser/nextgen-gallery/tags/4.0.3/src/Displ…
https://plugins.trac.wordpress.org/changeset/3460327/nextgen-gallery/trunk/src/…
https://www.wordfence.com/threat-intel/vulnerabilities/id/2d7bc556-cdaf-42a7-88…