First published: Tue Mar 26 2024(Updated: )
The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Credit: info@appcheck-ng.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Gallery Plugin | <=1.8.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29808 is considered a medium severity vulnerability due to the potential for reflected Cross Site Scripting attacks.
To fix CVE-2024-29808, update the WordPress Photo Gallery Plugin to version 1.8.22 or later.
CVE-2024-29808 affects the WordPress Photo Gallery Plugin version up to and including 1.8.21.
CVE-2024-29808 allows attackers to execute arbitrary JavaScript within a user's browser through reflected Cross Site Scripting.
A temporary workaround for CVE-2024-29808 is to disable the AJAX functionality of the affected plugin until a patch is applied.