Vulnerability Description
In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is able to inject malicious javascript.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Imagely | Nextgen Gallery | < 3.1.11 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7ExploitThird Party Advisory
- https://www.imagely.com/wordpress-gallery-plugin/nextgen-pro/changelog/Vendor Advisory
- https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7ExploitThird Party Advisory
- https://www.imagely.com/wordpress-gallery-plugin/nextgen-pro/changelog/Vendor Advisory
FAQ
What is CVE-2021-24293?
CVE-2021-24293 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is ab...
How severe is CVE-2021-24293?
CVE-2021-24293 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24293?
Check the references section above for vendor advisories and patch information. Affected products include: Imagely Nextgen Gallery.