Stored Cross-Site Scripting Vulnerability in FooGallery Plugin for WordPress
CVE-2024-12119

6.4MEDIUM

Key Information:

Summary

The FooGallery plugin for WordPress is susceptible to a Stored Cross-Site Scripting vulnerability through the default_gallery_title_size parameter, affecting all versions up to and including 2.4.29. Due to inadequate input sanitization and output escaping processes, authenticated users with roles such as gallery and album creators can exploit this flaw. Attackers can inject malicious web scripts into webpage elements, which will execute automatically when users access an affected page. This poses a significant risk to site visitors and could lead to unauthorized exposure of sensitive user data.

Affected Version(s)

FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel * <= 2.4.29

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stiofan O'Connor
.