The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a - Exploit, Third Party Advisory |
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
Summary | The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue |
Information
Published : 2021-08-16 11:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24362
Mitre link : CVE-2021-24362
CVE.ORG link : CVE-2021-24362
JSON object : View
Products Affected
10web
- photo_gallery
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')