LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1463 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 19, 2026

NextGEN Gallery - Local File Inclusion

Published: March 18, 2026Updated: March 19, 2026Remote Exploitable

Overview

NextGEN Gallery WordPress plugin <= 4.0.3 contains a local file inclusion vulnerability caused by improper validation of the 'template' parameter in gallery shortcodes, letting authenticated attackers with Author-level access execute arbitrary PHP files on the server.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 8.7%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers can execute arbitrary PHP code, bypass access controls, and obtain sensitive data, potentially leading to full server compromise.

Mitigation

Update to the latest version of NextGEN Gallery plugin.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 18, 2026

🟠 CVE-2026-1463 - High (8.8) The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.3 via the 'template' parameter in gallery shortcodes. This makes it possible f... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-1463/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1463
Severity
High
CVSS Score
8.8
Type
file_inclusion
Status
unconfirmed
EPSS
8.7%
Social Posts
1

CWE

  • CWE-98

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

8.7%Probability of exploitation in the next 30 days