The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET['image_url'] variable, which is reflected back to the users when executing the editimage_bwg AJAX action.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2706798%40photo-gallery&old=2694928%40photo-gallery&sfp_email=&sfph_mail= | Patch Third Party Advisory |
Configurations
Information
Published : 2022-05-02 09:15
Updated : 2022-05-10 12:20
NVD link : CVE-2022-1282
Mitre link : CVE-2022-1282
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
10web
- photo_gallery