Gallery Images Ape Security & Risk Analysis

wordpress.org/plugins/gallery-images-ape

Image gallery, responsive photo gallery grid, customizable image slider, simple interface, links, video links and lightbox, custom themes, thumbnails

1K active installs v2.2.8 PHP + WP 3.3+ Updated Oct 12, 2021
galleryimage-galleryphoto-gallerysliderslideshow
28
F · Critical Risk
CVEs total5
Unpatched3
Last CVEJan 3, 2025
Safety Verdict

Is Gallery Images Ape Safe to Use in 2026?

Critical Risk — Avoid

Score 28/100

Gallery Images Ape is critically unsafe with 5 known CVEs, 3 still unpatched. Avoid in production.

5 known CVEs 3 unpatched Last CVE: Jan 3, 2025Updated 4yr ago
Risk Assessment

The "gallery-images-ape" plugin, version 2.2.8, exhibits a concerning security posture, primarily due to its significant vulnerability history and several weaknesses identified in the static analysis. While the plugin demonstrates some good practices, such as utilizing prepared statements for SQL queries and including nonce checks, these are overshadowed by critical flaws. The presence of multiple AJAX handlers lacking authorization checks creates a substantial attack surface that could be exploited by unauthenticated users. Furthermore, the use of a dangerous function like `unserialize` without proper sanitization before use is a red flag for potential remote code execution or data manipulation vulnerabilities.

The plugin's history of five known CVEs, with three currently unpatched, including a high-severity vulnerability, strongly indicates a recurring pattern of security oversights. The common vulnerability types reported – Cross-Site Scripting and various forms of authorization flaws – align with the observed weaknesses in the static analysis, particularly the unprotected AJAX endpoints. This historical context suggests that the development team may struggle with secure coding practices, especially regarding input validation and access control.

In conclusion, while the plugin does not exhibit critical taint flows in the analyzed data and its SQL queries are prepared, the combination of unprotected entry points, a dangerous function, an outdated bundled library, and a persistent history of unpatched vulnerabilities makes this plugin a high-risk addition to any WordPress site. Users should exercise extreme caution and consider alternative plugins if possible, or at least ensure rigorous monitoring and patching if its use is unavoidable.

Key Concerns

  • 2 AJAX handlers without auth checks
  • Dangerous function: unserialize used
  • Only 4% of outputs properly escaped
  • Bundled outdated library: jQuery v1.9.1
  • 3 unpatched CVEs with high severity
  • Missing capability checks on AJAX handlers
Vulnerabilities
5

Gallery Images Ape Security Vulnerabilities

CVEs by Year

2 CVEs in 2019
2019
2 CVEs in 2022 · unpatched
2022
1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
4

5 total CVEs

CVE-2025-22317medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Gallery Images Ape <= 2.2.8 - Reflected Cross-Site Scripting

Jan 3, 2025Unpatched
CVE-2022-41785medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Gallery Images Ape <= 2.2.8 - Authenticated (Contributor+) Cross-Site Scripting

Oct 31, 2022Unpatched
CVE-2022-41995medium · 4.3Missing Authorization

Gallery Images Ape <= 2.2.8 - Missing Authorization

Oct 31, 2022Unpatched
CVE-2019-25149high · 7.6Improper Authorization

Gallery Images Ape <= 2.0.6 - Authenticated Plugin Deactivation

Dec 30, 2019 Patched in 2.0.7 (1485d)
CVE-2019-6117medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Gallery Images Ape <= 1.6.14 - Stored Cross-Site Scripting

Jan 10, 2019 Patched in 2.0.0 (1839d)
Code Analysis
Analyzed Mar 16, 2026

Gallery Images Ape Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
1 prepared
Unescaped Output
269
12 escaped
Nonce Checks
3
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$fieldValue = is_serialized($fieldValue) ? unserialize($fieldValue) : $fieldValue;modules\fields\include\apeGalleryFieldsMetaBoxClass.php:196

Bundled Libraries

jQuery1.9.1

SQL Query Safety

100% prepared1 total queries

Output Escaping

4% escaped281 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

6 flows3 with unsanitized paths
get_images_tags_from_ids (modules\ajax\init.php:27)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Gallery Images Ape Attack Surface

Entry Points5
Unprotected2

AJAX Handlers 3

authwp_ajax_ape_gallery_get_gallery_jsonmodules\block\init.php:22
authwp_ajax_yo_gallery_fields_saveoptionmodules\fields\include\apeGalleryFieldsAjax.php:18
authwp_ajax_wpape_gallery_default_theme_savemodules\theme\init.php:35

Shortcodes 2

[ape-gallery] modules\frontend\apeGalleryShortcode.php:14
[gallery] modules\frontend\apeGalleryShortcode.php:47
WordPress Hooks 36
actionplugins_loadedindex.php:43
actionenqueue_block_assetsmodules\block\init.php:19
actionenqueue_block_editor_assetsmodules\block\init.php:20
actioninitmodules\block\init.php:21
actionin_admin_headermodules\fields\config\metabox\feedback.php:12
actionin_admin_headermodules\fields\config\metabox\themes.default.php:31
actioninitmodules\fields\include\apeGalleryFields.php:27
actionadmin_enqueue_scriptsmodules\fields\include\apeGalleryFields.php:28
filteradmin_body_classmodules\fields\include\apeGalleryFields.php:29
actionadd_meta_boxesmodules\fields\include\apeGalleryFieldsMetaBoxClass.php:64
actionuser_registermodules\fields\include\apeGalleryFieldsMetaBoxClass.php:65
actionsave_postmodules\fields\include\apeGalleryFieldsMetaBoxClass.php:66
actionget_footermodules\frontend\apeGalleryGridBuild.php:225
actionget_footermodules\frontend\apeGalleryGridBuild.php:226
filterthe_contentmodules\frontend\apeGalleryShortcode.php:16
actionwp_loadedmodules\frontend\apeGalleryShortcode.php:19
actionget_footermodules\frontend\apeGallerySliderBuild.php:112
actionadmin_headmodules\media\init.php:18
filterattachment_fields_to_editmodules\media\init.php:20
actionadmin_headmodules\media\init.php:23
filterattachment_fields_to_savemodules\media\init.php:26
actioninitmodules\theme\init.php:29
actioninitmodules\theme\init.php:31
actioninitmodules\theme\init.php:33
actionadmin_noticesmodules\theme\init.php:37
actionwp_trash_postmodules\theme\init.php:46
actionadmin_noticesmodules\theme\init.php:52
filteradmin_body_classmodules\theme\init.php:54
actionadmin_menumodules\theme\init.php:56
filterpost_updated_messagesmodules\theme\init.php:57
actionin_admin_headermodules\theme\init.php:60
actionin_admin_headermodules\theme\init.php:61
filterpost_row_actionsmodules\theme\init.php:69
actionin_admin_headermodules\theme\init.php:71
actionadmin_head-edit.phpmodules\theme\init.php:73
filterthe_titlemodules\theme\init.php:82
Maintenance & Trust

Gallery Images Ape Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedOct 12, 2021
PHP min version
Downloads162K

Community Trust

Rating82/100
Number of ratings106
Active installs1K
Developer Profile

Gallery Images Ape Developer Profile

Gallery Ape

1 plugin · 1K total installs

29
trust score
Avg Security Score
28/100
Avg Patch Time
1662 days
View full developer profile
Detection Fingerprints

How We Detect Gallery Images Ape

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gallery-images-ape/libs/css/ape-gallery-core.css/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-core.js/wp-content/plugins/gallery-images-ape/libs/css/ape-gallery-lightbox.css/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-lightbox.js/wp-content/plugins/gallery-images-ape/libs/css/ape-gallery-video.css/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-video.js/wp-content/plugins/gallery-images-ape/modules/block/dist/blocks.style.build.css/wp-content/plugins/gallery-images-ape/modules/block/dist/blocks.build.js+3 more
Script Paths
/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-core.js/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-lightbox.js/wp-content/plugins/gallery-images-ape/libs/js/ape-gallery-video.js/wp-content/plugins/gallery-images-ape/modules/block/dist/blocks.build.js/wp-content/plugins/gallery-images-ape/modules/fields/asset/metabox/themes_default/script.js
Version Parameters
gallery-images-ape/libs/css/ape-gallery-core.css?ver=gallery-images-ape/libs/js/ape-gallery-core.js?ver=gallery-images-ape/libs/css/ape-gallery-lightbox.css?ver=gallery-images-ape/libs/js/ape-gallery-lightbox.js?ver=gallery-images-ape/libs/css/ape-gallery-video.css?ver=gallery-images-ape/libs/js/ape-gallery-video.js?ver=gallery-images-ape/modules/block/dist/blocks.style.build.css?ver=gallery-images-ape/modules/block/dist/blocks.build.js?ver=gallery-images-ape/modules/block/blocks.editor.build.css?ver=gallery-images-ape/modules/fields/asset/metabox/feedback/style.css?ver=gallery-images-ape/modules/fields/asset/metabox/themes_default/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpape-gallery-itemape-gallery-gridape-gallery-thumbape-gallery- lightboxape-gallery-video-thumb
HTML Comments
Ape Gallery Ape Gallery Blocks
Data Attributes
data-galleryid
JS Globals
apeGalleryHelperwpape_gallery_fields_themes_default
REST Endpoints
/wp-json/ape/v1/gallery/settings/wp-json/ape/v1/gallery/save/wp-json/ape/v1/gallery/delete/wp-json/ape/v1/gallery/get/wp-json/ape/v1/gallery/list/wp-json/ape-gallery/v1/gallery/json
Shortcode Output
[gallery-ape id=
FAQ

Frequently Asked Questions about Gallery Images Ape