Vulnerability Description
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 10Web | Photo Gallery | < 1.5.75 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851aExploitThird Party Advisory
- https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851aExploitThird Party Advisory
FAQ
What is CVE-2021-24362?
CVE-2021-24362 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users...
How severe is CVE-2021-24362?
CVE-2021-24362 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24362?
Check the references section above for vendor advisories and patch information. Affected products include: 10Web Photo Gallery.