The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
References
Link | Resource |
---|---|
https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/photo-gallery/#developers | Product |
https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/photo-gallery/#developers | Product |
Configurations
History
09 Apr 2025, 15:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
10web
10web photo Gallery |
|
References | () https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/photo-gallery/#developers - Product | |
CPE | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-03-26 16:15
Updated : 2025-04-09 15:42
NVD link : CVE-2024-29833
Mitre link : CVE-2024-29833
CVE.ORG link : CVE-2024-29833
JSON object : View
Products Affected
10web
- photo_gallery
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')