Lucene search

K
wpvulndbWpvulndbWPVDB-ID:57823DCB-2149-47F7-AAE2-D9F04DCE851A
HistoryJul 18, 2021 - 12:00 a.m.

Photo Gallery < 1.5.75 - Stored Cross-Site Scripting via Uploaded SVG

2021-07-1800:00:00
wpscan.com
5

The plugin did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue

PoC

When editing or creating a gallery, Click β€˜Add Images’ then β€˜Upload Files’ and upload an SVG with JavaScript code, then access the uploaded image from the uploads folder directly, e.g https://example.com/wp-content/uploads/photo-gallery/xss.svg Example of malicious SVG:

CPENameOperatorVersion
photo-gallerylt1.5.75
Related for WPVDB-ID:57823DCB-2149-47F7-AAE2-D9F04DCE851A