cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-10704,https://securityvulnerability.io/vulnerability/CVE-2024-10704,Stored Cross-Site Scripting Vulnerability in Photo Gallery by 10Web Plugin,"The Photo Gallery by 10Web WordPress plugin, prior to version 1.8.31, contains a critical stored cross-site scripting (XSS) vulnerability. This flaw originates from the plugin's failure to properly sanitize and escape certain settings, enabling high-privilege users, such as administrators, to execute harmful scripts. Importantly, this vulnerability may be exploited even in environments where the unfiltered_html capability is restricted, such as multisite configurations. As a result, this presents a significant risk for WordPress sites utilizing this plugin, highlighting the necessity for prompt updating and vigilant security practices.",Wordpress,Photo Gallery By 10web,,,0.0004299999854993075,false,,false,false,true,true,false,false,2024-11-29T06:00:07.129Z,0 CVE-2024-9878,https://securityvulnerability.io/vulnerability/CVE-2024-9878,Stored Cross-Site Scripting Vulnerability in 10Web Photo Gallery for WordPress,"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,4.8,MEDIUM,0.0005000000237487257,false,,false,false,false,,false,false,2024-11-05T09:30:58.925Z,0 CVE-2024-5968,https://securityvulnerability.io/vulnerability/CVE-2024-5968,10Web Photo Gallery Plugin Vulnerable to Stored Cross-Site Scripting Attacks,"The Photo Gallery by 10Web WordPress plugin before 1.8.28 does not properly sanitise and escape some of its Gallery settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",Wordpress,Photo Gallery By 10web,,,0.0004299999854993075,false,,false,false,true,true,false,false,2024-10-09T06:00:05.106Z,0 CVE-2024-5481,https://securityvulnerability.io/vulnerability/CVE-2024-5481,Vulnerability in 10Web's Mobile-Friendly Image Gallery Plugin Allows Attackers to Access Sensitive Information and Delete Directories,"The Photo Gallery by 10Web, a popular mobile-friendly image gallery plugin for WordPress, is affected by a Path Traversal vulnerability that affects all versions up to and including 1.8.23. This vulnerability arises from the esc_dir function, allowing authenticated attackers to manipulate file system operations by accessing arbitrary files on the server. Attackers can potentially copy sensitive information from these files or delete directories, including critical folders in the WordPress root. Although by default this issue is primarily exploitable by administrators, users with gallery edit permissions, including lower-level contributors in the premium version, may also be at risk. This vulnerability places the integrity and confidentiality of web servers at significant risk and highlights the importance of proper user permission management.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,8.8,HIGH,0.000750000006519258,false,,false,false,false,,false,false,2024-06-07T09:33:36.357Z,0 CVE-2024-5426,https://securityvulnerability.io/vulnerability/CVE-2024-5426,Stored Cross-Site Scripting Vulnerability in 10Web's Mobile-Friendly Image Gallery Plugin,"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘svg’ parameter in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure Photo Gallery can be extended to contributors on pro versions of the plugin.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,5.4,MEDIUM,0.0005300000193528831,false,,false,false,false,,false,false,2024-06-07T09:33:35.276Z,0 CVE-2024-2296,https://securityvulnerability.io/vulnerability/CVE-2024-2296,Stored Cross-Site Scripting Vulnerability in 10Web's Mobile-Friendly Image Gallery Plugin,"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.8.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-04-06T09:15:00.000Z,0 CVE-2024-0221,https://securityvulnerability.io/vulnerability/CVE-2024-0221,Directory Traversal Vulnerability in Photo Gallery by 10Web for WordPress,"The Photo Gallery plugin by 10Web for WordPress contains a Directory Traversal vulnerability that affects all versions up to and including 1.8.19. Exploitation occurs via the rename_item function, granting authenticated attackers the ability to rename arbitrary files on the server. This serious flaw poses a risk of site takeovers, particularly if the critical wp-config.php file is targeted. Although primarily exploitable by administrators, the premium version of the plugin allows for gallery management permissions to be granted to lower-level users, potentially widening the attack surface to contributors and others with limited access privileges.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,9.1,CRITICAL,0.000699999975040555,false,,false,false,false,,false,false,2024-02-05T21:21:40.205Z,0 CVE-2023-6924,https://securityvulnerability.io/vulnerability/CVE-2023-6924,Stored Cross-Site Scripting Vulnerability in Photo Gallery by 10Web for WordPress,"The Photo Gallery by 10Web plugin for WordPress is susceptible to Stored Cross-Site Scripting due to inadequate input sanitization and output escaping on user-supplied attributes. This vulnerability allows authenticated attackers with administrator-level permissions to inject arbitrary web scripts into pages. The malicious scripts can then execute when any user accesses those introduced pages, potentially leading to serious security breaches. The risk is heightened for attackers with contributor-level access if additional page builder plugins are utilized.",Wordpress,Photo Gallery by 10Web – Mobile-Friendly Image Gallery,4.8,MEDIUM,0.0006799999973736703,false,,false,false,false,,false,false,2024-01-11T08:32:29.092Z,0 CVE-2023-1427,https://securityvulnerability.io/vulnerability/CVE-2023-1427,Photo Gallery by 10Web < 1.8.15 - Admin+ Path Traversal,"- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector.",Wordpress,Photo Gallery by 10Web,4.9,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2023-04-17T13:15:00.000Z,0 CVE-2022-4058,https://securityvulnerability.io/vulnerability/CVE-2022-4058,Photo Gallery < 1.8.3 - Stored XSS via CSRF,"The Photo Gallery by 10Web WordPress plugin before 1.8.3 does not validate and escape some parameters before outputting them back in in JS code later on in another page, which could lead to Stored XSS issue when an attacker makes a logged in admin open a malicious URL or page under their control.",Wordpress,Photo Gallery By 10web,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-12-19T13:41:43.962Z,0 CVE-2022-1394,https://securityvulnerability.io/vulnerability/CVE-2022-1394,Photo Gallery < 1.6.4 - Admin+ Stored Cross-Site Scripting,"The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-06-08T10:15:00.000Z,0 CVE-2022-1282,https://securityvulnerability.io/vulnerability/CVE-2022-1282,Photo Gallery < 1.6.3 - Reflected Cross-Site Scripting,"The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET['image_url'] variable, which is reflected back to the users when executing the editimage_bwg AJAX action.",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,6.1,MEDIUM,0.0007399999885819852,false,,false,false,false,,false,false,2022-05-02T16:05:58.000Z,0 CVE-2022-1281,https://securityvulnerability.io/vulnerability/CVE-2022-1281,Photo Gallery < 1.6.3 - Unauthenticated SQL Injection,"The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST['filter_tag'] parameter, which is appended to an SQL query, making SQL Injection attacks possible.",Wordpress,Photo Gallery by 10Web – Mobile-Friendly Image Gallery,9.8,CRITICAL,0.003120000008493662,false,,false,false,false,,false,false,2022-05-02T16:05:57.000Z,0 CVE-2022-0169,https://securityvulnerability.io/vulnerability/CVE-2022-0169,Photo Gallery by 10Web < 1.6.0 - Unauthenticated SQL Injection,"The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,9.8,CRITICAL,0.03123999945819378,false,,false,false,false,,false,false,2022-03-14T14:41:22.000Z,0 CVE-2021-25041,https://securityvulnerability.io/vulnerability/CVE-2021-25041,Photo Gallery by 10Web < 1.5.68 - Reflected Cross-Site Scripting (XSS),The Photo Gallery by 10Web WordPress plugin before 1.5.68 is vulnerable to Reflected Cross-Site Scripting (XSS) issues via the bwg_album_breadcrumb_0 and shortcode_id GET parameters passed to the bwg_frontend_data AJAX action,Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,6.1,MEDIUM,0.000699999975040555,false,,false,false,false,,false,false,2021-12-06T15:55:40.000Z,0 CVE-2021-24363,https://securityvulnerability.io/vulnerability/CVE-2021-24363,Photo Gallery < 1.5.75 - File Upload Path Traversal,"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images/SVG anywhere in the filesystem via a path traversal vector",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,4.9,MEDIUM,0.0005600000149570405,false,,false,false,false,,false,false,2021-08-16T10:48:17.000Z,0 CVE-2021-24362,https://securityvulnerability.io/vulnerability/CVE-2021-24362,Photo Gallery < 1.5.75 - Stored Cross-Site Scripting via Uploaded SVG,"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,6.1,MEDIUM,0.0006699999794363976,false,,false,false,false,,false,false,2021-08-16T10:48:16.000Z,0 CVE-2021-24310,https://securityvulnerability.io/vulnerability/CVE-2021-24310,Photo Gallery < 1.5.67 - Authenticated Stored Cross-Site Scripting via Gallery Title,"The Photo Gallery by 10Web - Mobile-Friendly Image Gallery WordPress plugin before 1.5.67 did not properly sanitise the gallery title, allowing high privilege users to create one with XSS payload in it, which will be triggered when another user will view the gallery list or the affected gallery in the admin dashboard. This is due to an incomplete fix of CVE-2019-16117",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-06-01T11:33:29.000Z,0 CVE-2021-24291,https://securityvulnerability.io/vulnerability/CVE-2021-24291,Photo Gallery < 1.5.69 - Multiple Reflected Cross-Site Scripting (XSS),"The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.69 was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and _id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users)",Wordpress,Photo Gallery By 10web – Mobile-friendly Image Gallery,6.1,MEDIUM,0.01940000057220459,false,,false,false,false,,false,false,2021-05-14T11:38:18.000Z,0 CVE-2021-24139,https://securityvulnerability.io/vulnerability/CVE-2021-24139,Photo Gallery by 10Web < 1.5.55 - Unauthenticated SQL Injection,"Unvalidated input in the Photo Gallery (10Web Photo Gallery) WordPress plugin, versions before 1.5.55, leads to SQL injection via the frontend/models/model.php bwg_search_x parameter.",Wordpress,Photo Gallery By 10web,9.8,CRITICAL,0.0015800000401213765,false,,false,false,false,,false,false,2021-03-18T14:57:49.000Z,0