Impact
The Foogallery plugin contains a stored cross‑site scripting vulnerability that allows authenticated contributors to inject arbitrary web scripts through the `data-caption-title` and `data-caption-description` attributes. The input is insufficiently sanitized or escaped, so the malicious script will execute in any visitor’s browser when the gallery page containing the injected content is loaded, resulting in client‑side code execution on site visitors.
Affected Systems
The vulnerability affects WordPress installations running Foogallery plugin versions 2.4.31 and earlier under the vendor Fooplugins: Gallery by Foogallery.
Risk and Exploitability
The CVSS score of 6.4 classifies the flaw as moderate, while an EPSS score of less than 1 % indicates a low immediate exploitation probability. The flaw is not listed in the CISA KEV catalog. The vulnerability requires authenticated Contributor or higher access; if credentials are obtained, the injected script will run for all users who view the vulnerable gallery page.
OpenCVE Enrichment
EUVD