The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Apr 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
10web
10web photo Gallery |
|
CPEs | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
10web
10web photo Gallery |

Status: PUBLISHED
Assigner: AppCheck
Published:
Updated: 2024-08-02T16:39:55.380Z
Reserved: 2024-03-19T16:26:38.384Z
Link: CVE-2024-29809

Updated: 2024-08-02T01:17:58.045Z

Status : Analyzed
Published: 2024-03-26T16:15:12.520
Modified: 2025-04-01T17:37:19.677
Link: CVE-2024-29809

No data.