The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-26803 The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 01 Apr 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web photo Gallery
CPEs cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
Vendors & Products 10web
10web photo Gallery

cve-icon MITRE

Status: PUBLISHED

Assigner: AppCheck

Published:

Updated: 2024-08-02T16:39:55.380Z

Reserved: 2024-03-19T16:26:38.384Z

Link: CVE-2024-29809

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:58.045Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-26T16:15:12.520

Modified: 2025-04-01T17:37:19.677

Link: CVE-2024-29809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.