The plugin does not sanitize and escape some of its Image fields, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
Create a gallery with the "Gallery Theme" set to "Gallery Image 2", add an image and put the following payload in the "Image Description" field: <svg/onload=alert(/XSS/)> Save the image and gallery and view a post/page where the gallery is embed to trigger the XSS The "Image Title" field is also vulnerable, with a payload such as "><img src onerror=alert(/XSS/)> (fixed in 1.1.5)
Fayçal CHENA
Fayçal CHENA
Yes
2022-06-03 (about 1 years ago)
2022-06-03 (about 1 years ago)
2023-03-06 (about 6 months ago)