The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
History

Wed, 09 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared 10web
10web photo Gallery
CPEs cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*
Vendors & Products 10web
10web photo Gallery

cve-icon MITRE

Status: PUBLISHED

Assigner: AppCheck

Published:

Updated: 2024-08-02T16:46:09.578Z

Reserved: 2024-03-20T09:56:32.456Z

Link: CVE-2024-29833

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:57.411Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-26T16:15:13.063

Modified: 2025-04-09T15:42:02.640

Link: CVE-2024-29833

cve-icon Redhat

No data.