
UnGallery Security & Risk Analysis
wordpress.org/plugins/ungalleryPublish thousands of pictures in WordPress, in minutes.
Is UnGallery Safe to Use in 2026?
Use With Caution
Score 58/100UnGallery has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The ungallery v2.2.4 plugin exhibits a mixed security posture, with some positive aspects overshadowed by significant concerns. While the plugin avoids exposing a large attack surface through traditional WordPress entry points like AJAX handlers, REST API routes, and shortcodes, and uses prepared statements for all SQL queries, these strengths are undermined by critical vulnerabilities. The presence of the 'exec' dangerous function is a serious red flag, indicating a potential for arbitrary code execution if misused. Furthermore, the taint analysis revealing flows with unsanitized paths is concerning, even without critical or high severity findings, as it suggests potential pathways for malicious input to be processed improperly.
The plugin's vulnerability history is particularly alarming. With two known CVEs, including one critical unpatched vulnerability, and a recent history of critical Cross-site Scripting and Code Injection issues, this plugin presents a substantial risk. The pattern of critical vulnerabilities in the past, combined with the presence of dangerous functions and unsanitized taint flows in the current version, strongly suggests a recurring problem with secure coding practices. The lack of nonce checks and only one capability check across all code also contributes to a weaker security framework.
In conclusion, while the plugin has a clean entry point surface and secure SQL practices, the critical unpatched CVE, the presence of 'exec', a significant number of unsanitized taint flows, and a history of critical code injection and XSS vulnerabilities make this plugin a high-risk component. The lack of comprehensive capability and nonce checks further exacerbates these risks, making it imperative to address these issues immediately.
Key Concerns
- Unpatched critical CVE
- Presence of dangerous function 'exec'
- Flows with unsanitized paths identified
- Output escaping only 50% proper
- No nonce checks
- Only one capability check
- Historical critical vulnerability (Code Injection)
- Historical critical vulnerability (XSS)
UnGallery Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
UnGallery <= 2.2.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting
UnGallery < 2.1.6 - Command Injection
UnGallery Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
UnGallery Attack Surface
WordPress Hooks 6
Maintenance & Trust
UnGallery Maintenance & Trust
Maintenance Signals
Community Trust
UnGallery Alternatives
Social Photo Fetcher
facebook-photo-fetcher
Allows you to automatically create Wordpress photo galleries from Facebook albums. Simple to use and highly customizable.
PiwigoPress
piwigopress
From any open API Piwigo gallery, swiftly include your photos in Posts/Pages and/or add randomized thumbnails and menus in your sidebar.
ThickBox
thickbox
Embed ThickBox into your posts and pages.
Easy Gallery Slider
easy-gallery-slider
Responsive slider uses the images attached to a post or page. Simple to customize and configure.
SmoothGallery
smoothgallery
Embed JonDesign's SmoothGallery into your posts and pages.
UnGallery Developer Profile
1 plugin · 30 total installs
How We Detect UnGallery
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/ungallery/styles.css/wp-content/plugins/ungallery/script.js/wp-content/plugins/ungallery/source.php/wp-content/plugins/ungallery/script.jsungallery/styles.css?ver=ungallery/script.js?ver=HTML / DOM Fingerprints
post-headlineUnGallery version: If we are in thumbnails view,name="myform"style="display: inline"submitform