Multiple cross-site scripting (XSS) vulnerabilities in the Photo Gallery plugin before 1.2.11 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via the (1) sort_by, (2) sort_order, (3) items_view, (4) dir, (5) clipboard_task, (6) clipboard_files, (7) clipboard_src, or (8) clipboard_dest parameters in an addImages action to wp-admin/admin-ajax.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wordpress.org/plugins/photo-gallery/changelog/ | third party advisory |
http://www.securityfocus.com/archive/1/archive/1/534568/100/0/threaded | vdb entry third party advisory broken link |
https://plugins.trac.wordpress.org/changeset/1073334/ | third party advisory |
https://plugins.trac.wordpress.org/changeset/1076678/photo-gallery | third party advisory |
https://seclists.org/bugtraq/2015/Jan/140 | mailing list exploit third party advisory |