The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/photoswipe-masonry/ | Product |
https://www.wordfence.com/blog/2022/02/stored-cross-site-scripting-vulnerability-patched-in-a-wordpress-photo-gallery-plugin/ | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/64624d4c-3ffb-4516-a938-0accde24c79f?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-03-23T19:46:50
Updated: 2023-10-20T15:06:16.859Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-0750
JSON object: View
NVD Information
Status : Modified
Published: 2022-03-23T20:15:10.297
Modified: 2023-11-07T03:41:33.233
Link: CVE-2022-0750
JSON object: View
Redhat Information
No data.
CWE