The plugin does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode
Log in as contributor and add the following shortcode in a post [vgallery id=“=0; alert();x”] Then view the post to trigger the XSS
CPE | Name | Operator | Version |
---|---|---|---|
polo-video-gallery | eq | * |