Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.0
WordPress Responsive Lightbox Plugin Lets Attackers Access Internal Services
CVE-2026-2479
Summary
A security issue in the WordPress Responsive Lightbox & Gallery plugin allows attackers with Author-level access to make unauthorized requests to internal services. This could allow them to access sensitive information or disrupt your website's operations. Update to a fixed version of the plugin to protect your site.
Original title
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-b...
Original description
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-based hostname validation instead of strict host comparison in the `ajax_upload_image()` function. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services.
nvd CVSS3.1
5.0
Vulnerability type
CWE-918
Server-Side Request Forgery (SSRF)
- https://plugins.trac.wordpress.org/browser/responsive-lightbox/tags/2.7.0/includ...
- https://plugins.trac.wordpress.org/browser/responsive-lightbox/tags/2.7.0/includ...
- https://plugins.trac.wordpress.org/browser/responsive-lightbox/trunk/includes/cl...
- https://plugins.trac.wordpress.org/changeset/3464566?contextall=1
- https://www.wordfence.com/threat-intel/vulnerabilities/id/44276b28-9509-4f59-936...
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026