The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-26802 The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 01 Apr 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web photo Gallery
CPEs cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
Vendors & Products 10web
10web photo Gallery

cve-icon MITRE

Status: PUBLISHED

Assigner: AppCheck

Published:

Updated: 2024-08-02T16:42:56.230Z

Reserved: 2024-03-19T16:26:38.384Z

Link: CVE-2024-29808

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:57.353Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-26T16:15:12.323

Modified: 2025-04-01T17:44:53.793

Link: CVE-2024-29808

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.