CVE-2026-32330
Cross-Site Request Forgery in 10Web Photo Gallery
Publication date: 2026-03-13
Last updated on: 2026-03-16
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 10web | photo_gallery | to 1.8.37 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-32330 is a Cross Site Request Forgery (CSRF) vulnerability affecting the WordPress Photo Gallery by 10Web Plugin versions up to and including 1.8.37.
This vulnerability allows a malicious actor to trick higher privileged users into executing unwanted actions while authenticated, such as by clicking a malicious link, visiting a crafted page, or submitting a form.
The exploit requires user interaction and the involvement of a privileged user, but no authentication is required for the attacker to initiate the attack.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized actions being performed by privileged users without their consent, potentially compromising the integrity of the affected system.
However, the vulnerability is classified with a low severity score (CVSS 4.3) and is considered a low-impact threat that is unlikely to be widely exploited.
Users are advised to update to version 1.8.38 or later to mitigate the risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a Cross Site Request Forgery (CSRF) issue affecting the WordPress Photo Gallery by 10Web Plugin versions up to and including 1.8.37.
Detection involves verifying the installed version of the Photo Gallery plugin on your WordPress system to see if it is version 1.8.37 or earlier.
You can check the plugin version by running commands on your server such as:
- Using WP-CLI: wp plugin list | grep photo-gallery
- Checking the plugin version in the WordPress admin dashboard under Plugins.
There are no specific network detection commands or signatures mentioned for this CSRF vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the Photo Gallery by 10Web Plugin to version 1.8.38 or later, where the vulnerability has been patched.
Since this is a CSRF vulnerability, additional general mitigations include:
- Avoid clicking on suspicious links or visiting untrusted pages while logged in as a privileged user.
- Implement security measures such as CSRF tokens and ensure proper access controls are in place.
Patchstack offers automated updates and rapid mitigation options which can be used to quickly address this issue.