WordPress Plugin Vulnerabilities

Image Gallery - Grid Gallery < 1.1.6 - Admin+ Stored Cross-Site Scripting

Description

The plugin does not sanitize and escape some of its Image fields, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

Proof of Concept

Create a gallery with the "Gallery Theme" set to "Gallery Image 2", add an image and put the following payload in the "Image Description" field: <svg/onload=alert(/XSS/)>
Save the image and gallery and view a post/page where the gallery is embed to trigger the XSS

The "Image Title" field is also vulnerable, with a payload such as "><img src onerror=alert(/XSS/)> (fixed in 1.1.5)

Affects Plugins

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Fayçal CHENA
Submitter
Fayçal CHENA
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-06-03 (about 1 years ago)
Added
2022-06-03 (about 1 years ago)
Last Updated
2023-03-06 (about 1 years ago)

Other