Description
The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26802 | The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue. |
References
History
Tue, 01 Apr 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
10web
10web photo Gallery |
|
| CPEs | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
10web
10web photo Gallery |
Status: PUBLISHED
Assigner: AppCheck
Published:
Updated: 2024-08-02T16:42:56.230Z
Reserved: 2024-03-19T16:26:38.384Z
Link: CVE-2024-29808
Updated: 2024-08-02T01:17:57.353Z
Status : Analyzed
Published: 2024-03-26T16:15:12.323
Modified: 2025-04-01T17:44:53.793
Link: CVE-2024-29808
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD