Home

Description

The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 4.2.0. This is due to insufficient object-level authorization in the image deletion REST flow where the permission callback for DELETE /imagely/v1/images/{id} only checks 'NextGEN Manage gallery' permissions and does not enforce gallery ownership or 'NextGEN Manage others gallery' permissions. This makes it possible for authenticated attackers, with Subscriber-level privileges and 'NextGEN Manage gallery' capability, to delete gallery images belonging to other users as well as their associated image files from disk when deleteImg is enabled (default).

PUBLISHED Reserved 2026-04-18 | Published 2026-05-20 | Updated 2026-05-20 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-04-18:Vendor Notified
2026-05-19:Disclosed

Credits

Bao Luu Gia Nguyen finder

References

www.wordfence.com/...-21ea-4a0b-b1fd-5de9f8f5ee7a?source=cve

plugins.trac.wordpress.org/changeset/3533432/nextgen-gallery

cve.org (CVE-2026-6566)

nvd.nist.gov (CVE-2026-6566)

Download JSON