First published: Sat Mar 01 2025(Updated: )
The Album Gallery – WordPress Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.3 via deserialization of untrusted input from gallery meta. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Album Gallery | <=1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-13833 is critical due to the potential for PHP Object Injection and its exploitation by authenticated attackers.
To fix CVE-2024-13833, update the Album Gallery plugin to version 1.6.4 or later.
CVE-2024-13833 affects users of the Album Gallery plugin for WordPress who are running versions 1.6.3 or earlier.
CVE-2024-13833 can enable authenticated attackers to execute arbitrary PHP code on vulnerable WordPress installations.
The impact of CVE-2024-13833 includes the potential compromise of website integrity and unauthorized access to sensitive data.