Impact
A reflected XSS flaw allows an attacker to inject JavaScript into the web page generated by the WordPress Photo Gallery plugin. When a victim visits a crafted URL or gallery page, the unneutralized input is echoed back, enabling the attacker to execute arbitrary code in the victim’s browser. This can lead to session hijacking, credential theft, defacement, or redirecting users to malicious sites.
Affected Systems
The issue affects the adamlabs WordPress Photo Gallery plugin (photo-gallery‑portfolio) on any WordPress installation using version 1.1.0 or earlier. No additional products or versions are listed.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderately high severity, but the EPSS score of < 1% means that exploitation is currently considered unlikely. The vulnerability is not listed in the CISA KEV catalog. Because the error is reflected, an attacker must entice a user to open a crafted link; the attack vector is remote and does not require authentication or privileged access. The risk to an organization depends on how many sites run the affected plugin and whether those sites host sensitive user data.
OpenCVE Enrichment