All the vulnerabilites related to Unknown - Photo Gallery by 10Web – Mobile-Friendly Image Gallery
cve-2021-24363
Vulnerability from cvelistv5
Published
2021-08-16 10:48
Modified
2024-08-03 19:28
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images/SVG anywhere in the filesystem via a path traversal vector
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.5.75 < 1.5.75 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:28:23.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.5.75", "status": "affected", "version": "1.5.75", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "avolume" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images/SVG anywhere in the filesystem via a path traversal vector" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T10:48:17", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974" } ], "source": { "discovery": "UNKNOWN" }, "title": "Photo Gallery \u003c 1.5.75 - File Upload Path Traversal", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24363", "STATE": "PUBLIC", "TITLE": "Photo Gallery \u003c 1.5.75 - File Upload Path Traversal" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.5.75", "version_value": "1.5.75" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "avolume" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images/SVG anywhere in the filesystem via a path traversal vector" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/1628935f-1d7d-4609-b7a9-e5526499c974" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24363", "datePublished": "2021-08-16T10:48:17", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:28:23.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25041
Vulnerability from cvelistv5
Published
2021-12-06 15:55
Modified
2024-08-03 19:49
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web WordPress plugin before 1.5.68 is vulnerable to Reflected Cross-Site Scripting (XSS) issues via the bwg_album_breadcrumb_0 and shortcode_id GET parameters passed to the bwg_frontend_data AJAX action
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2467205 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.5.68 < 1.5.68 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:14.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2467205" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.5.68", "status": "affected", "version": "1.5.68", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "ThuraMoeMyint" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.5.68 is vulnerable to Reflected Cross-Site Scripting (XSS) issues via the bwg_album_breadcrumb_0 and shortcode_id GET parameters passed to the bwg_frontend_data AJAX action" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-06T15:55:40", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2467205" } ], "source": { "discovery": "EXTERNAL" }, "title": "Photo Gallery by 10Web \u003c 1.5.68 - Reflected Cross-Site Scripting (XSS)", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-25041", "STATE": "PUBLIC", "TITLE": "Photo Gallery by 10Web \u003c 1.5.68 - Reflected Cross-Site Scripting (XSS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.5.68", "version_value": "1.5.68" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "ThuraMoeMyint" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web WordPress plugin before 1.5.68 is vulnerable to Reflected Cross-Site Scripting (XSS) issues via the bwg_album_breadcrumb_0 and shortcode_id GET parameters passed to the bwg_frontend_data AJAX action" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/32aee3ea-e0af-44da-a16c-102c83eaed8f" }, { "name": "https://plugins.trac.wordpress.org/changeset/2467205", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2467205" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-25041", "datePublished": "2021-12-06T15:55:40", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:14.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24362
Vulnerability from cvelistv5
Published
2021-08-16 10:48
Modified
2024-08-03 19:28
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.5.75 < 1.5.75 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:28:23.722Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.5.75", "status": "affected", "version": "1.5.75", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "avolume" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-16T10:48:16", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a" } ], "source": { "discovery": "UNKNOWN" }, "title": "Photo Gallery \u003c 1.5.75 - Stored Cross-Site Scripting via Uploaded SVG", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24362", "STATE": "PUBLIC", "TITLE": "Photo Gallery \u003c 1.5.75 - Stored Cross-Site Scripting via Uploaded SVG" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.5.75", "version_value": "1.5.75" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "avolume" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/57823dcb-2149-47f7-aae2-d9f04dce851a" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24362", "datePublished": "2021-08-16T10:48:16", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:28:23.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0169
Vulnerability from cvelistv5
Published
2022-03-14 14:41
Modified
2024-08-02 23:18
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.6.0 < 1.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.6.0", "status": "affected", "version": "1.6.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Krzysztof Zaj\u0105c" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-14T14:41:22", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9" } ], "source": { "discovery": "EXTERNAL" }, "title": "Photo Gallery by 10Web \u003c 1.6.0 - Unauthenticated SQL Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0169", "STATE": "PUBLIC", "TITLE": "Photo Gallery by 10Web \u003c 1.6.0 - Unauthenticated SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.6.0", "version_value": "1.6.0" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Krzysztof Zaj\u0105c" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c" }, { "name": "https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0169", "datePublished": "2022-03-14T14:41:22", "dateReserved": "2022-01-10T00:00:00", "dateUpdated": "2024-08-02T23:18:41.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1282
Vulnerability from cvelistv5
Published
2022-05-02 16:05
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET['image_url'] variable, which is reflected back to the users when executing the editimage_bwg AJAX action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.6.3 < 1.6.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=2706798%40photo-gallery\u0026old=2694928%40photo-gallery\u0026sfp_email=\u0026sfph_mail=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.6.3", "status": "affected", "version": "1.6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "JrXnm" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET[\u0027image_url\u0027] variable, which is reflected back to the users when executing the editimage_bwg AJAX action." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-02T16:05:58", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=2706798%40photo-gallery\u0026old=2694928%40photo-gallery\u0026sfp_email=\u0026sfph_mail=" } ], "source": { "discovery": "EXTERNAL" }, "title": "Photo Gallery \u003c 1.6.3 - Reflected Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-1282", "STATE": "PUBLIC", "TITLE": "Photo Gallery \u003c 1.6.3 - Reflected Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.6.3", "version_value": "1.6.3" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "JrXnm" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET[\u0027image_url\u0027] variable, which is reflected back to the users when executing the editimage_bwg AJAX action." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6" }, { "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=2706798%40photo-gallery\u0026old=2694928%40photo-gallery\u0026sfp_email=\u0026sfph_mail=", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=2706798%40photo-gallery\u0026old=2694928%40photo-gallery\u0026sfp_email=\u0026sfph_mail=" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-1282", "datePublished": "2022-05-02T16:05:58", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-02T23:55:24.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1394
Vulnerability from cvelistv5
Published
2022-06-06 08:50
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.6.4 < 1.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "lessThan": "1.6.4", "status": "affected", "version": "1.6.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "0ppr2s" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-06T08:50:56", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3" } ], "source": { "discovery": "EXTERNAL" }, "title": "Photo Gallery \u003c 1.6.4 - Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-1394", "STATE": "PUBLIC", "TITLE": "Photo Gallery \u003c 1.6.4 - Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.6.4", "version_value": "1.6.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "0ppr2s" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-1394", "datePublished": "2022-06-06T08:50:56", "dateReserved": "2022-04-19T00:00:00", "dateUpdated": "2024-08-03T00:03:06.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1281
Vulnerability from cvelistv5
Published
2022-05-02 16:05
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST['filter_tag'] parameter, which is appended to an SQL query, making SQL Injection attacks possible.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Photo Gallery by 10Web – Mobile-Friendly Image Gallery |
Version: 1.6.3 < 1.6.3* |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2706797/photo-gallery/trunk/frontend/models/BWGModelGalleryBox.php?old=2587758\u0026old_path=photo-gallery%2Ftrunk%2Ffrontend%2Fmodels%2FBWGModelGalleryBox.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "vendor": "Unknown", "versions": [ { "changes": [ { "at": "1.6.3", "status": "unaffected" } ], "lessThan": "1.6.3*", "status": "affected", "version": "1.6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "JrXnm" } ], "descriptions": [ { "lang": "en", "value": "The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST[\u0027filter_tag\u0027] parameter, which is appended to an SQL query, making SQL Injection attacks possible." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-02T16:05:57", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2706797/photo-gallery/trunk/frontend/models/BWGModelGalleryBox.php?old=2587758\u0026old_path=photo-gallery%2Ftrunk%2Ffrontend%2Fmodels%2FBWGModelGalleryBox.php" } ], "source": { "discovery": "EXTERNAL" }, "title": "Photo Gallery \u003c 1.6.3 - Unauthenticated SQL Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-1281", "STATE": "PUBLIC", "TITLE": "Photo Gallery \u003c 1.6.3 - Unauthenticated SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "1.6.3", "version_value": "1.6.3" }, { "version_affected": "\u003c", "version_name": "1.6.3", "version_value": "1.6.3" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "JrXnm" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST[\u0027filter_tag\u0027] parameter, which is appended to an SQL query, making SQL Injection attacks possible." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de" }, { "name": "https://plugins.trac.wordpress.org/changeset/2706797/photo-gallery/trunk/frontend/models/BWGModelGalleryBox.php?old=2587758\u0026old_path=photo-gallery%2Ftrunk%2Ffrontend%2Fmodels%2FBWGModelGalleryBox.php", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2706797/photo-gallery/trunk/frontend/models/BWGModelGalleryBox.php?old=2587758\u0026old_path=photo-gallery%2Ftrunk%2Ffrontend%2Fmodels%2FBWGModelGalleryBox.php" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-1281", "datePublished": "2022-05-02T16:05:57", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-02T23:55:24.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }