WordPress Plugin Vulnerabilities

FooGallery < 2.4.15 - Author+ Stored XSS

Description

The plugin does not validate and escape some of its Gallery settings before outputting them back in the page, which could allow users with a role as low as Author to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin

Proof of Concept

Create a new Gallery (with at least one image) and put the below payload in the Gallery Settings > Advanced >  Custom Attributes settings

123="" onpointerenter="alert(/XSS/)"

The XSS will be triggered in page/post where the gallery is embed and the mouse is moved over the image from the gallery

Affects Plugins

Fixed in 2.4.15
Fixed in 2.4.15

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Dmitrii Ignatyev
Submitter
Dmitrii Ignatyev
Submitter website
Verified
Yes

Timeline

Publicly Published
2024-05-23 (about 1 months ago)
Added
2024-05-23 (about 1 months ago)
Last Updated
2024-06-06 (about 20 days ago)

Other