Stored Cross-Site Scripting Vulnerability in FooGallery Plugin for WordPress
CVE-2024-12119
6.4MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 8 March 2025
Summary
The FooGallery plugin for WordPress is susceptible to a Stored Cross-Site Scripting vulnerability through the default_gallery_title_size parameter, affecting all versions up to and including 2.4.29. Due to inadequate input sanitization and output escaping processes, authenticated users with roles such as gallery and album creators can exploit this flaw. Attackers can inject malicious web scripts into webpage elements, which will execute automatically when users access an affected page. This poses a significant risk to site visitors and could lead to unauthorized exposure of sensitive user data.
Affected Version(s)
FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel * <= 2.4.29
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Stiofan O'Connor