WordPress Plugin Vulnerabilities
Photos and Files Contest Gallery < 21.3.1 - Author+ Stored Cross Site Scripting
Description
The plugin does not sanitize and escape some parameters, which could allow users with a role as low as author to perform Cross-Site Scripting attacks.
Proof of Concept
1. Add a New gallery, and click on the "Add files" button to add content. 2. Now add a description for this content with the XSS payload and save the changes: <script>alert('XSS');</script> 3. Click on the "cg_gallery_no_voting" that redirects to the page to display the content. It will appear in the pop-up alert.
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
Miscellaneous
Original Researcher
Giulio
Submitter
Mistborn
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2024-02-14 (about 2 months ago)
Added
2024-02-14 (about 2 months ago)
Last Updated
2024-02-14 (about 2 months ago)