Code Injection Vulnerability in FooGallery by WordPress
CVE-2025-22624

6.4MEDIUM

Key Information:

Vendor
Bradvin
Status
Foogallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
Vendor
CVE Published:
27 February 2025

Summary

FooGallery, a popular WordPress plugin for presenting images, has been identified with a vulnerability that allows for code injection. This flaw originates from the dynamic generation of web content without proper validation of the input source in the 'myapp/extensions/albums/admin/class-meta boxes.php' file. Attackers can exploit this vulnerability to inject malicious code, potentially leading to unauthorized access or control over the affected system. It is crucial for users of FooGallery to review their installations and apply necessary updates to safeguard against this type of exploitation.

Affected Version(s)

FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel 2.4.29

References

CVSS V4

Score:
6.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.