First published: Fri Jan 24 2025(Updated: )
The Simple Gallery with Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'c2tw_sgwf' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Gallery | <=2.0 | |
Come2theweb Simple Gallery With Filter | <2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-13583 is considered high due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-13583, update the Simple Gallery with Filter plugin to version 2.1 or later where the vulnerability is patched.
CVE-2024-13583 affects all versions of the Simple Gallery with Filter plugin up to and including version 2.0.
CVE-2024-13583 is a Stored Cross-Site Scripting (XSS) vulnerability.
Yes, CVE-2024-13583 can be exploited remotely if an attacker injects malicious scripts through the vulnerable shortcode.