Impact
The Picture Gallery plugin fails to properly neutralize user input when generating web pages, allowing an attacker to inject malicious JavaScript. Inferred from the title that a CSRF request could store the payload, but the description explicitly states reflected XSS can also be triggered. An attacker who succeeds can execute arbitrary code in the victim's browser, potentially hijacking sessions, defacing sites, or exfiltrating data, thereby compromising confidentiality, integrity, and user trust.
Affected Systems
The vulnerability affects the videowhisper Picture Gallery plugin for WordPress, specifically all releases from the first version through version 1.6.3. Sites running any of these versions without an update are affected.
Risk and Exploitability
The CVSS score of 7.1 indicates a medium to high severity, while the EPSS score of less than 1% suggests that exploitation is currently rare but possible. The vulnerability is not listed in the CISA KEV catalog, meaning no publicly confirmed exploits are known, yet the potential impact remains significant. Exploit likelihood is low in the short term but could increase if an attacker discovers a convenient CSRF or input vector in the plugin’s administration interface.
OpenCVE Enrichment
EUVD