In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is able to inject malicious javascript.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/5e1a4725-3d20-44b0-8a35-bbf4263957f7 | third party advisory exploit |
https://www.imagely.com/wordpress-gallery-plugin/nextgen-pro/changelog/ | vendor advisory |