First published: Tue Mar 26 2024(Updated: )
The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Credit: info@appcheck-ng.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Gallery Plugin | <=1.8.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29809 is classified as a medium severity vulnerability due to its potential for reflected Cross Site Scripting.
To fix CVE-2024-29809, ensure that you update the WordPress Photo Gallery Plugin to the latest version available.
CVE-2024-29809 affects the WordPress Photo Gallery Plugin versions up to and including 1.8.21.
CVE-2024-29809 is a remote vulnerability that can be exploited through manipulated AJAX requests.
CVE-2024-29809 can lead to arbitrary JavaScript execution on the affected website, enabling attackers to perform actions on behalf of users.