Description
Filterable Portfolio Gallery 1.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by entering payloads in the title field. Attackers can store JavaScript code like image tags with onerror handlers that execute when the gallery is previewed, affecting all users viewing the page.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Murat DEMIRCI (@butterflyhunt3r)
References
www.exploit-db.com/exploits/50458 (ExploitDB-50458)
www.filterable-portfolio.com/ (Official Product Homepage)
wordpress.org/plugins/fg-gallery/ (Product Reference)
www.vulncheck.com/...filterable-portfolio-gallery-stored-xss (VulnCheck Advisory: WordPress Plugin Filterable Portfolio Gallery 1.0 Stored XSS)