Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FooPlugins FooGallery foogallery allows Stored XSS.This issue affects FooGallery: from n/a through <= 3.1.11.
Published: 2026-02-19
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS
Action: Apply Patch
AI Analysis

Impact

Foogallery for WordPress stores content that is later displayed without proper escaping, allowing an attacker to inject malicious scripts. The vulnerability is a stored cross‑site scripting flaw (CWE‑79) that can compromise the integrity of a website and any users who view the affected content. In a successful exploitation, an attacker could execute arbitrary JavaScript in the context of the visitor’s browser, potentially hijacking sessions, defacing the site, or delivering malware.

Affected Systems

The affected product is the FooPlugins FooGallery WordPress plugin, versions 3.1.11 and older. All WordPress sites running these versions are vulnerable, as the flaw is present through the last released 3.1.11 build. The plugin is a gallery component that shows images and media, and its storage functions are used by administrators and possibly contributor users.

Risk and Exploitability

With a CVSS score of 5.9, the flaw is considered moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation. The flaw is not listed in the CISA KEV catalog, meaning no known high‑profile exploit has been observed. The attack vector is inferred to be the web interface that accepts user‑supplied gallery metadata, so an attacker would need to insert malicious content into that data stream before it is rendered to site visitors. An unauthenticated user could potentially exploit the flaw if the plugin allows content input from such users; otherwise an authenticated user with gallery management privileges is required.

Generated by OpenCVE AI on April 16, 2026 at 00:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FooGallery plugin to the latest available version (e.g., 3.1.12 or later).
  • If an upgrade is not immediately possible, disable or remove the plugin from the site to eliminate the vulnerable code.
  • Run a site‑wide review for any gallery entries that may contain malicious scripts and delete or sanitize them.

Generated by OpenCVE AI on April 16, 2026 at 00:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Fooplugins
Fooplugins foogallery
Wordpress
Wordpress wordpress
Vendors & Products Fooplugins
Fooplugins foogallery
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FooPlugins FooGallery foogallery allows Stored XSS.This issue affects FooGallery: from n/a through <= 3.1.11.
Title WordPress FooGallery plugin <= 3.1.11 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Fooplugins Foogallery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:49.754Z

Reserved: 2026-02-02T12:52:48.541Z

Link: CVE-2026-25362

cve-icon Vulnrichment

Updated: 2026-02-20T15:53:24.400Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:19.020

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:30:18Z

Weaknesses