WordPress Plugin Vulnerabilities
Photo Gallery < 1.6.4 - Admin+ Stored Cross-Site Scripting
Description
The plugin does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed
Proof of Concept
Go to Photo Gallery > Global Settings > Watermark Using the web browser inspector, change the input type of the "Watermark font size" and "Watermark opacity" fields from number to text, and put the following payload in them, then save: " autofocus onfocus=alert(/XSS/)// Other settings which should be number (such as "Number of preloaded images" in the General tab) are also affected
Affects Plugins
References
CVE
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
0ppr2s
Submitter
dnr6419
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-05-16 (about 1 years ago)
Added
2022-05-16 (about 1 years ago)
Last Updated
2022-05-17 (about 1 years ago)