The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
History

Tue, 01 Apr 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web photo Gallery
CPEs cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
Vendors & Products 10web
10web photo Gallery

cve-icon MITRE

Status: PUBLISHED

Assigner: AppCheck

Published:

Updated: 2024-08-02T16:39:55.380Z

Reserved: 2024-03-19T16:26:38.384Z

Link: CVE-2024-29809

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:58.045Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-26T16:15:12.520

Modified: 2025-04-01T17:37:19.677

Link: CVE-2024-29809

cve-icon Redhat

No data.