The thumb_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the thumb_url parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
10web
10web photo Gallery |
|
CPEs | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
10web
10web photo Gallery |

Status: PUBLISHED
Assigner: AppCheck
Published:
Updated: 2024-08-02T16:44:14.472Z
Reserved: 2024-03-19T16:26:38.385Z
Link: CVE-2024-29810

Updated: 2024-08-02T01:17:58.441Z

Status : Analyzed
Published: 2024-03-26T16:15:12.707
Modified: 2025-04-09T15:41:36.520
Link: CVE-2024-29810

No data.