Description
The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26803 | The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue. |
References
History
Tue, 01 Apr 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
10web
10web photo Gallery |
|
| CPEs | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
10web
10web photo Gallery |
Status: PUBLISHED
Assigner: AppCheck
Published:
Updated: 2024-08-02T16:39:55.380Z
Reserved: 2024-03-19T16:26:38.384Z
Link: CVE-2024-29809
Updated: 2024-08-02T01:17:58.045Z
Status : Analyzed
Published: 2024-03-26T16:15:12.520
Modified: 2025-04-01T17:37:19.677
Link: CVE-2024-29809
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD