Best WordPress Gallery Plugin Vulnerability – FooGallery – Authenticated Stored Cross-Site Scripting – CVE-2024-2081 & CVE-2024-247 | WordPress Plugin Vulnerability Report

Plugin Name: Best WordPress Gallery Plugin – FooGallery

Key Information:

  • Software Type: Plugin
  • Software Slug: foogallery
  • Software Status: Active
  • Software Author: bradvin
  • Software Downloads: 4,914,021
  • Active Installs: 100,000
  • Last Updated: April 16, 2024
  • Patched Versions: 2.4.15
  • Affected Versions: <= 2.4.14

Vulnerability 1 Details:

  • Name: FooGallery <= 2.4.14
  • Title: Authenticated (Author+) Stored Cross-Site Scripting
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-2081
  • CVSS Score: 6.4
  • Publicly Published: April 5, 2024
  • Researcher: Robert Kruczek (ProXy) - Safety-Online.pl
  • Description: The Best WordPress Gallery Plugin – FooGallery is vulnerable to Stored Cross-Site Scripting via the 'foogallery_attachment_modal_save' action in all versions up to, and including, 2.4.14. This vulnerability occurs due to insufficient input sanitization and output escaping, allowing authenticated attackers with author-level access to inject arbitrary web scripts in pages that execute when a user accesses an injected page.

Vulnerability 2 Details:

  • Name: FooGallery <= 2.4.14
  • Title: Authenticated (Author+) Stored Cross-Site Scripting via Image Attachment Fields
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-247
  • CVSS Score: 6.4
  • Publicly Published: April 5, 2024
  • Researcher: Tim Coen
  • Description: The FooGallery plugin is also vulnerable to Stored Cross-Site Scripting through various image attachment fields such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type'. Like the first vulnerability, this issue stems from inadequate input sanitization and output escaping, enabling authenticated users to deploy harmful scripts.

Summary:

The Best WordPress Gallery Plugin – FooGallery has vulnerabilities in versions up to and including 2.4.14 that allow for Stored Cross-Site Scripting through actions and image fields. These vulnerabilities have been addressed in version 2.4.15.

Detailed Overview:

These vulnerabilities expose websites to potential security risks where malicious scripts could be stored on the website and executed by any user accessing the compromised pages. Such vulnerabilities are particularly dangerous as they can lead to unauthorized access, data theft, and manipulation of website content without the knowledge of site administrators. Immediate updates to the patched version along with a review of user roles and permissions are necessary to mitigate these risks.

Advice for Users:

  • Immediate Action: Update to the patched version 2.4.15 immediately to close off these vulnerabilities.
  • Check for Signs of Vulnerability: Admins should check their sites for unexpected content changes or unauthorized scripts. Review the roles of all users with author-level access or higher to ensure they are trusted.
  • Alternate Plugins: While the current vulnerabilities have been patched, users concerned about security might consider evaluating other gallery plugins that have had fewer security issues.
  • Stay Updated: Continuously monitor and update all plugins to their latest versions to prevent security vulnerabilities.

Conclusion:

The swift action taken by FooGallery's developers to patch these vulnerabilities shows their commitment to user security. It is imperative for users to ensure they are using version 2.4.15 or later to maintain the security of their WordPress installations. Regular updates and vigilance are essential in protecting against potential cybersecurity threats.

References:

Detailed Report: 

Introduction:

In the ever-evolving landscape of website management, the security of WordPress plugins represents a pivotal front in the battle against cyber threats. The discovery of two significant vulnerabilities within the Best WordPress Gallery Plugin – FooGallery underscores this ongoing challenge. Both vulnerabilities, detailed as CVE-2024-2081 and CVE-2024-247, involve Stored Cross-Site Scripting (XSS) that could allow attackers with mere author-level access to execute malicious scripts across user sessions. This stark reminder highlights the critical importance of regularly updating your website’s plugins and maintaining rigorous security checks to protect your digital assets. As you navigate through these technical waters, this post aims to elucidate the risks posed by these vulnerabilities, offer practical steps for remediation, and provide resources to help secure your site against potential invasions of privacy and security.

Vulnerability Overview:

  1. CVE-2024-2081: Authenticated Stored Cross-Site Scripting via the 'foogallery_attachment_modal_save' action. This vulnerability was introduced due to insufficient input sanitization and output escaping, enabling attackers with author-level access to inject harmful scripts.
  2. CVE-2024-247: Similar to the first, this vulnerability affects image attachment fields such as 'Title', 'Alt Text', 'Custom URL', etc. It allows the injection of scripts which execute when a user interacts with the affected fields.

Risks and Impacts:

These vulnerabilities expose websites to potential security risks including unauthorized access, data theft, and manipulation of website content without administrators' knowledge. Such breaches can significantly damage a business’s reputation, lead to loss of customer trust, and potentially invite legal consequences if sensitive information is compromised.

Remediation Steps:

  1. Update Immediately: Upgrade to version 2.4.15 of FooGallery, which resolves these vulnerabilities.
  2. Audit Your Site: Check for unexpected changes or scripts in your site’s content. Review user permissions to ensure only trusted users have elevated access.
  3. Consider Alternatives: While patches are available, continuous occurrences of vulnerabilities may warrant evaluating other gallery plugins that have demonstrated stronger security records.

Previous Vulnerabilities:

FooGallery has experienced a total of 11 vulnerabilities reported since February 25, 2019, indicating a pattern that necessitates heightened vigilance and proactive management.

Conclusion:

The quick response by FooGallery’s developers to patch known vulnerabilities reflects a commitment to security, but it also highlights the importance of regular monitoring and updates on the user’s part. For small business owners managing WordPress websites, integrating regular security checks and updates into your website maintenance routines can significantly mitigate risks. Staying informed through trusted cybersecurity resources can also empower you to take swift action, ensuring the security and integrity of your digital presence.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Best WordPress Gallery Plugin Vulnerability – FooGallery – Authenticated Stored Cross-Site Scripting – CVE-2024-2081 & CVE-2024-247 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment