Description
WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Aryan Chehreghani
References
www.exploit-db.com/exploits/50187 (ExploitDB-50187)
wordpress.org/plugins/picture-gallery/ (Product Reference)
www.vulncheck.com/...gallery-stored-xss-via-edit-content-url (VulnCheck Advisory: WordPress Picture Gallery 1.4.2 Stored XSS via Edit Content URL)