Description
WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.
Published: 2026-05-10
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

WordPress Picture Gallery 1.4.2 contains a stored cross‑site scripting vulnerability that allows an attacker who is authenticated to the WordPress site to inject malicious JavaScript payloads into the Edit Content URL field. When the stored value is later rendered in the plugin’s functionality, the browser executes the injected script, giving the attacker the ability to hijack the user session or steal credentials from site visitors. The weakness is a classic input‑validation flaw identified as CWE‑79, and it is only exploitable by users who have editing privileges on the plugin.

Affected Systems

The vulnerability exists in the WordPress Picture Gallery plugin version 1.4.2, which is distributed by Video Whispers. WordPress sites that have installed this version of the plugin and do not use the default role restrictions are vulnerable. All other plugin versions and un‑installed instances are unaffected.

Risk and Exploitability

The CVSS score for this issue is 5.1, indicating a moderate security impact. No EPSS score is available, but the lack of an EPSS entry does not imply the risk is low; the vulnerability requires only an authenticated user with editing rights, which many sites provide to administrators. The issue is not present in the CISA KEV catalog. Attackers would first authenticate, then modify the Edit Content URL field, after which any visitor who experiences the affected functionality would have the injected script executed. Because it is a stored XSS, the impact lasts until the offending setting is removed or the plugin is upgraded. The potential to hijack sessions or compromise credentials makes it a non‑negligible risk for sites with laxer role assignments.

Generated by OpenCVE AI on May 10, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Picture Gallery plugin to the latest release (any version after 1.4.2).
  • Remove any custom scripts that remain stored in the Edit Content URL field.
  • Restrict the ability to edit plugin settings to Administrator accounts only, or a very small set of trusted roles.
  • Optionally, enforce a content security policy that blocks inline scripts or limits script sources to trusted domains.

Generated by OpenCVE AI on May 10, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.
Title WordPress Picture Gallery 1.4.2 Stored XSS via Edit Content URL
First Time appeared Videowhisper
Videowhisper picture Gallery
Weaknesses CWE-79
CPEs cpe:2.3:a:videowhisper:picture_gallery:1.4.2:*:*:*:*:*:*:*
Vendors & Products Videowhisper
Videowhisper picture Gallery
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Videowhisper Picture Gallery
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-10T12:52:12.438Z

Reserved: 2026-02-01T11:24:18.719Z

Link: CVE-2021-47951

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T13:16:31.720

Modified: 2026-05-10T13:16:31.720

Link: CVE-2021-47951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T15:00:11Z

Weaknesses