First published: Mon Feb 05 2024(Updated: )
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.8.19 via the rename_item function. This makes it possible for authenticated attackers to rename arbitrary files on the server. This can lead to site takeovers if the wp-config.php file of a site can be renamed. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery management permissions to lower level users, which might make this exploitable by users as low as contributors.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
10quality Post Gallery | <1.8.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0221 is classified as a critical vulnerability due to the potential for authenticated attackers to exploit directory traversal to rename arbitrary files on the server.
To fix CVE-2024-0221, update the Photo Gallery by 10Web plugin to version 1.8.20 or later.
CVE-2024-0221 affects all versions of the Photo Gallery by 10Web plugin up to and including version 1.8.19 on WordPress.
Exploiting CVE-2024-0221 could lead to unauthorized file renaming, potentially compromising web server integrity and data.
Yes, exploitation of CVE-2024-0221 requires authentication, allowing only logged-in users to perform the attack.