Insecure Direct Object Reference in FooGallery Plugin for WordPress
CVE-2024-12114
4.3MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 8 March 2025
Summary
The FooGallery - Responsive Photo Gallery plugin for WordPress has a vulnerability that allows authenticated attackers with access to make unauthorized changes to post and page content. This vulnerability arises from a lack of proper validation on a user-controlled key (img_id) during the processing of the foogallery_attachment_modal_save AJAX action. Notably, for the vulnerability to be exploited, the Gallery Creator Role must be configured with a value lower than 'Editor'. This flaw exposes WordPress sites to potential content manipulation risks if not addressed.
Affected Version(s)
FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel * <= 2.4.29
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Stiofan O'Connor