Best WordPress Gallery Plugin Vulnerability– FooGallery – Authenticated(Administrator+) Stored Cross-Site Scripting via Settings – CVE-2024-0604 | WordPress Plugin Vulnerability Report
Plugin Name: Best WordPress Gallery Plugin – FooGallery
Key Information:
- Software Type: Plugin
- Software Slug: foogallery
- Software Status: Active
- Software Author: bradvin
- Software Downloads: 4,701,372
- Active Installs: 100,000
- Last Updated: February 16, 2024
- Patched Versions: 2.4.9
- Affected Versions: <= 2.4.7
Vulnerability Details:
- Name: Best WordPress Gallery Plugin – FooGallery <= 2.4.7
- Title: Authenticated(Administrator+) Stored Cross-Site Scripting via settings
- Type: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-0604
- CVSS Score: 4.4
- Publicly Published: February 14, 2024
- Researcher: Akbar Kustirama
- Description: The plugin is vulnerable to Stored Cross-Site Scripting via admin settings due to insufficient input sanitization and output escaping. This allows attackers with administrator-level permissions to inject arbitrary web scripts in pages, affecting multi-site installations and sites where unfiltered_html is disabled.
Summary:
The Best WordPress Gallery Plugin – FooGallery for WordPress harbors a vulnerability in versions up to and including 2.4.7 that permits authenticated attackers with administrator-level permissions to inject arbitrary web scripts in pages via admin settings. This vulnerability has been patched in version 2.4.9.
Detailed Overview:
This vulnerability, identified by researcher Akbar Kustirama, arises from inadequate input sanitization and output escaping within the plugin's admin settings, posing a risk primarily to multi-site installations and sites with unfiltered_html disabled. It allows attackers with sufficient permissions to perform Stored Cross-Site Scripting (XSS) attacks, potentially compromising site integrity and user security. The prompt patching of this vulnerability in version 2.4.9 mitigates the risk, ensuring that installations are safeguarded against potential exploits.
Advice for Users:
Immediate Action: Users are urged to update to the patched version 2.4.9 to secure their sites against this vulnerability. Check for Signs of Vulnerability: Administrators should review their site for unexpected script executions in admin settings pages and monitor user roles to ensure only trusted individuals have administrative access. Alternate Plugins: Considering alternative gallery plugins with a strong security record can serve as a precautionary measure. Stay Updated: Keeping plugins updated is crucial in maintaining site security and functionality, preventing potential vulnerabilities.
Conclusion:
The quick response by the plugin developers in releasing a patch underscores the critical nature of maintaining up-to-date installations for WordPress site security. Users are advised to update to version 2.4.9 or later to safeguard their installations against CVE-2024-0604.