Impact
The CVE describes an improper neutralization of input that results in stored XSS. This flaw permits an attacker to inject malicious scripts into web pages rendered by WordPress, leading to potential session hijacking, data theft, or phishing. The weakness (CWE‑79) means the input is saved and served without sanitization.
Affected Systems
The vulnerability exists in WordPress Awesome Gallery plugin by Raihanul Islam, affecting all versions from the earliest through 1.0. Any installation using the plugin with a version number 1.0 or lower is exposed.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. EPSS < 1% suggests low exploitation probability, and the vulnerability is not listed in KEV. The attack vector is inferred: an attacker would need a path to submit malicious content—typically via gallery upload functionality—which, if unsanitized, is stored and then served to all users. Once an image or gallery item is stored, every user who views the gallery triggers the injected script.
OpenCVE Enrichment
EUVD