CVE-2026-32330
Received Received - Intake
Cross-Site Request Forgery in 10Web Photo Gallery

Publication date: 2026-03-13

Last updated on: 2026-03-16

Assigner: Patchstack

Description
Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo Gallery by 10Web photo-gallery allows Cross Site Request Forgery.This issue affects Photo Gallery by 10Web: from n/a through <= 1.8.37.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
10web photo_gallery to 1.8.37 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32330 is a Cross Site Request Forgery (CSRF) vulnerability affecting the WordPress Photo Gallery by 10Web Plugin versions up to and including 1.8.37.

This vulnerability allows a malicious actor to trick higher privileged users into executing unwanted actions while authenticated, such as by clicking a malicious link, visiting a crafted page, or submitting a form.

The exploit requires user interaction and the involvement of a privileged user, but no authentication is required for the attacker to initiate the attack.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized actions being performed by privileged users without their consent, potentially compromising the integrity of the affected system.

However, the vulnerability is classified with a low severity score (CVSS 4.3) and is considered a low-impact threat that is unlikely to be widely exploited.

Users are advised to update to version 1.8.38 or later to mitigate the risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a Cross Site Request Forgery (CSRF) issue affecting the WordPress Photo Gallery by 10Web Plugin versions up to and including 1.8.37.

Detection involves verifying the installed version of the Photo Gallery plugin on your WordPress system to see if it is version 1.8.37 or earlier.

You can check the plugin version by running commands on your server such as:

  • Using WP-CLI: wp plugin list | grep photo-gallery
  • Checking the plugin version in the WordPress admin dashboard under Plugins.

There are no specific network detection commands or signatures mentioned for this CSRF vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the Photo Gallery by 10Web Plugin to version 1.8.38 or later, where the vulnerability has been patched.

Since this is a CSRF vulnerability, additional general mitigations include:

  • Avoid clicking on suspicious links or visiting untrusted pages while logged in as a privileged user.
  • Implement security measures such as CSRF tokens and ensure proper access controls are in place.

Patchstack offers automated updates and rapid mitigation options which can be used to quickly address this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart