First published: Tue Mar 26 2024(Updated: )
The thumb_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the thumb_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Credit: info@appcheck-ng.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Gallery Plugin | <=1.8.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29810 is classified as a medium severity reflected Cross Site Scripting vulnerability.
To fix CVE-2024-29810, update the WordPress Photo Gallery Plugin to version 1.8.22 or higher.
CVE-2024-29810 affects the WordPress Photo Gallery Plugin versions up to and including 1.8.21.
Exploiting CVE-2024-29810 can allow an attacker to inject arbitrary JavaScript into the user's browser, potentially leading to data theft or site defacement.
As a temporary workaround for CVE-2024-29810, you can disable AJAX calls to the editimage_bwg action until a patch is applied.