Code Injection Vulnerability in FooGallery by WordPress
CVE-2025-22624
6.4MEDIUM
Key Information:
- Vendor
- Bradvin
- Status
- Foogallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
- Vendor
- CVE Published:
- 27 February 2025
Summary
FooGallery, a popular WordPress plugin for presenting images, has been identified with a vulnerability that allows for code injection. This flaw originates from the dynamic generation of web content without proper validation of the input source in the 'myapp/extensions/albums/admin/class-meta boxes.php' file. Attackers can exploit this vulnerability to inject malicious code, potentially leading to unauthorized access or control over the affected system. It is crucial for users of FooGallery to review their installations and apply necessary updates to safeguard against this type of exploitation.
Affected Version(s)
FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel 2.4.29
References
CVSS V4
Score:
6.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved