First published: Fri Aug 09 2019(Updated: )
The 10Web Photo Gallery plugin before 1.5.25 for WordPress has Authenticated Local File Inclusion via directory traversal in the wp-admin/admin-ajax.php?action=shortcode_bwg tagtext parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
10web Photo Gallery | <1.5.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14798 is a vulnerability in the 10Web Photo Gallery plugin for WordPress that allows authenticated remote attackers to execute arbitrary code via a directory traversal attack.
CVE-2019-14798 occurs due to a flaw in the wp-admin/admin-ajax.php file of the plugin, where the 'tagtext' parameter is not properly validated, leading to the possibility of directory traversal attacks.
The severity of CVE-2019-14798 is rated as medium with a CVSS severity score of 4.9.
To fix CVE-2019-14798, update the 10Web Photo Gallery plugin to version 1.5.25 or higher, which contains the necessary security patches.
Yes, you can find additional information about CVE-2019-14798 at the following references: [1] https://wordpress.org/plugins/photo-gallery/#developers, [2] https://wpvulndb.com/vulnerabilities/9361, [3] https://www.pluginvulnerabilities.com/2019/05/14/authenticated-local-file-inclusion-lfi-vulnerability-in-photo-gallery-by-10web/