First published: Tue Mar 26 2024(Updated: )
The current_url parameter of the AJAX call to the GalleryBox action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the current_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. No authentication is required to exploit this issue. Note that other parameters within a AJAX call, such as image_id, must be valid for this vulnerability to be successfully exploited.
Credit: info@appcheck-ng.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Gallery Plugin | <=1.8.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29832 is rated as a medium severity vulnerability due to the potential for reflected Cross Site Scripting.
To fix CVE-2024-29832, update the WordPress Photo Gallery Plugin to version 1.8.22 or later.
CVE-2024-29832 is a reflected Cross Site Scripting (XSS) vulnerability that allows arbitrary JavaScript insertion.
CVE-2024-29832 affects the WordPress Photo Gallery Plugin up to version 1.8.21.
CVE-2024-29832 can lead to session hijacking and malicious content execution in the context of the user’s browser.