Home

Description

WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.

PUBLISHED Reserved 2026-02-01 | Published 2026-05-10 | Updated 2026-05-10 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.4.2
affected

Credits

Aryan Chehreghani finder

References

www.exploit-db.com/exploits/50187 (ExploitDB-50187) exploit

wordpress.org/plugins/picture-gallery/ (Product Reference) product

www.vulncheck.com/...gallery-stored-xss-via-edit-content-url (VulnCheck Advisory: WordPress Picture Gallery 1.4.2 Stored XSS via Edit Content URL) third-party-advisory

cve.org (CVE-2021-47951)

nvd.nist.gov (CVE-2021-47951)

Download JSON