First published: Tue Mar 26 2024(Updated: )
The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
Credit: info@appcheck-ng.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Gallery Plugin | <=1.8.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29833 is classified as a medium severity vulnerability due to its potential for Cross Site Scripting attacks.
To mitigate CVE-2024-29833, update the WordPress Photo Gallery Plugin to the latest version beyond 1.8.21.
CVE-2024-29833 allows attackers to perform Cross Site Scripting attacks by uploading malicious SVG files.
CVE-2024-29833 affects the WordPress Photo Gallery Plugin version 1.8.21 and earlier.
CVE-2024-29833 bypasses security measures by exploiting a regular expression that fails to account for whitespace in script tag payloads.