First published: Sat Apr 06 2024(Updated: )
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.8.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
10quality Post Gallery | <=1.8.21 | |
<1.8.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2296 is considered a high-severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-2296, update the Photo Gallery by 10Web plugin to version 1.8.22 or later.
CVE-2024-2296 allows authenticated attackers to execute arbitrary JavaScript code in the context of the victim's browser, potentially compromising user data.
CVE-2024-2296 affects all versions of the Photo Gallery by 10Web plugin up to and including version 1.8.21.
CVE-2024-2296 is classified as a stored cross-site scripting (XSS) vulnerability.