The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
10web
10web photo Gallery |
|
CPEs | cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
10web
10web photo Gallery |

Status: PUBLISHED
Assigner: AppCheck
Published:
Updated: 2024-08-02T16:46:09.578Z
Reserved: 2024-03-20T09:56:32.456Z
Link: CVE-2024-29833

Updated: 2024-08-02T01:17:57.411Z

Status : Analyzed
Published: 2024-03-26T16:15:13.063
Modified: 2025-04-09T15:42:02.640
Link: CVE-2024-29833

No data.