CVE-2024-29833

medium

Description

The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.

References

https://wordpress.org/plugins/photo-gallery/#developers

https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/

Details

Source: Mitre, NVD

Published: 2024-03-26

Updated: 2024-08-02

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Severity: Medium