CVE-2024-29833

The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*

History

09 Apr 2025, 15:42

Type Values Removed Values Added
CPE cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
References () https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ - () https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ - Exploit, Third Party Advisory
References () https://wordpress.org/plugins/photo-gallery/#developers - () https://wordpress.org/plugins/photo-gallery/#developers - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time 10web photo Gallery
10web

26 Mar 2024, 17:09

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 16:15

Updated : 2025-04-09 15:42


NVD link : CVE-2024-29833

Mitre link : CVE-2024-29833


JSON object : View

Products Affected

10web

  • photo_gallery
CWE

No CWE.