The plugin does not properly sanitise the images metadata (namely title) before outputting them in the generated gallery. This allows privileged accounts such as editor+ to perform XSS attacks (even without the unfiltered_html capability) against users visiting the gallery in the frontend.
{"id": "WPEX-ID:F3952BD1-AC2F-4007-9E19-6C44A22465F3", "type": "wpexploit", "bulletinFamily": "exploit", "title": "Envira Gallery Lite < 1.8.3.3 - Authenticated Stored Cross-Site Scripting", "description": "The plugin does not properly sanitise the images metadata (namely title) before outputting them in the generated gallery. This allows privileged accounts such as editor+ to perform XSS attacks (even without the unfiltered_html capability) against users visiting the gallery in the frontend.\n", "published": "2020-12-19T00:00:00", "modified": "2021-01-20T06:00:48", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "", "reporter": "SunCSR (Sun Cyber Security Research)", "references": ["https://plugins.trac.wordpress.org/changeset/2442591"], "cvelist": ["CVE-2021-24126"], "lastseen": "2021-02-15T22:33:24", "viewCount": 90, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24126"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:F3952BD1-AC2F-4007-9E19-6C44A22465F3"]}], "rev": 4}, "score": {"value": 4.4, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24126"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:F3952BD1-AC2F-4007-9E19-6C44A22465F3"]}]}, "exploitation": null, "vulnersScore": 4.4}, "sourceData": "As an editor+, add an image to a gallery and set its title (via the metadata) to <img src onerror=alert(/XSS/)>. Then view a page where the gallery is embed.\r\n\r\nhttps://drive.google.com/open?id=1G15mMK4mLFV5VUL_vWxpbbBDworjciiM", "generation": 1, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646187870}}
{"wpvulndb": [{"lastseen": "2021-02-15T22:33:24", "bulletinFamily": "software", "cvelist": ["CVE-2021-24126"], "description": "The plugin does not properly sanitise the images metadata (namely title) before outputting them in the generated gallery. This allows privileged accounts such as editor+ to perform XSS attacks (even without the unfiltered_html capability) against users visiting the gallery in the frontend.\n\n### PoC\n\nAs an editor+, add an image to a gallery and set its title (via the metadata) to ![](). Then view a page where the gallery is embed. https://drive.google.com/open?id=1G15mMK4mLFV5VUL_vWxpbbBDworjciiM\n", "modified": "2021-01-20T06:00:48", "published": "2020-12-19T00:00:00", "id": "WPVDB-ID:F3952BD1-AC2F-4007-9E19-6C44A22465F3", "href": "https://wpscan.com/vulnerability/f3952bd1-ac2f-4007-9e19-6c44a22465f3", "type": "wpvulndb", "title": "Envira Gallery Lite < 1.8.3.3 - Authenticated Stored Cross-Site Scripting", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2022-03-23T14:47:19", "description": "Unvalidated input and lack of output encoding in the Envira Gallery Lite WordPress plugin, versions before 1.8.3.3, did not properly sanitise the images metadata (namely title) before outputting them in the generated gallery, which could lead to privilege escalation.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-03-18T15:15:00", "type": "cve", "title": "CVE-2021-24126", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24126"], "modified": "2021-03-24T20:30:00", "cpe": [], "id": "CVE-2021-24126", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24126", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": []}]}