CVE-2024-29809

medium

Description

The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.

References

https://wordpress.org/plugins/photo-gallery/#developers

https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/

Details

Source: Mitre, NVD

Published: 2024-03-26

Updated: 2024-08-02

Risk Information

CVSS v2

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Severity: Medium