Code Injection Vulnerability in FooGallery by WordPress
CVE-2025-22624

6.4MEDIUM

What is CVE-2025-22624?

FooGallery, a popular WordPress plugin for presenting images, has been identified with a vulnerability that allows for code injection. This flaw originates from the dynamic generation of web content without proper validation of the input source in the 'myapp/extensions/albums/admin/class-meta boxes.php' file. Attackers can exploit this vulnerability to inject malicious code, potentially leading to unauthorized access or control over the affected system. It is crucial for users of FooGallery to review their installations and apply necessary updates to safeguard against this type of exploitation.

Affected Version(s)

FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel 2.4.29

References

CVSS V4

Score:
6.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
The Cyber Security Vulnerability Database.