CVE-2022-0750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in deanoakley Photoswipe Masonry Gallery
The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.
AI Analysis
Technical Summary
CVE-2022-0750 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Photoswipe Masonry Gallery WordPress plugin developed by deanoakley. This vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient escaping and sanitization of several parameters: thumbnail_width, thumbnail_height, max_image_width, and max_image_height. These parameters are handled in the photoswipe-masonry.php file. An authenticated attacker with at least limited privileges can exploit this flaw by injecting arbitrary web scripts into galleries created by the plugin or on the PhotoSwipe Options page. Because the vulnerability requires authentication but no user interaction, it allows an attacker who has access to the WordPress backend to execute malicious JavaScript code in the context of the victim’s browser. This can lead to session hijacking, defacement, or other attacks that leverage script execution. The vulnerability affects all versions up to and including 1.2.14 of the plugin. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or updates have been linked in the provided data. This vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper input sanitization leading to XSS.
Potential Impact
For European organizations using WordPress websites with the Photoswipe Masonry Gallery plugin, this vulnerability presents a tangible risk of unauthorized script execution within authenticated sessions. The impact includes potential theft of session cookies, unauthorized actions performed on behalf of legitimate users, and the injection of malicious content that could damage brand reputation or lead to data leakage. Since the vulnerability requires authentication, the risk is higher in environments where multiple users have backend access, such as agencies, content teams, or multi-user editorial platforms. Exploitation could facilitate lateral movement or privilege escalation within the web application environment. Given the widespread use of WordPress in Europe across various sectors including media, e-commerce, and government websites, the vulnerability could be leveraged to target sensitive information or disrupt services. However, the absence of known active exploits reduces immediate risk, but the medium severity score indicates that timely remediation is important to prevent future attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Photoswipe Masonry Gallery plugin, especially versions up to 1.2.14. If found, they should restrict plugin usage to trusted administrators only and review user privileges to minimize the number of accounts with authenticated access. Since no official patch is linked, organizations should monitor the plugin vendor’s repository or WordPress plugin directory for updates or security patches addressing CVE-2022-0750. In the interim, applying Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameters (thumbnail_width, thumbnail_height, max_image_width, max_image_height) can reduce exploitation risk. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Regular security training for administrators to recognize and report suspicious activity is also recommended. Finally, organizations should consider alternative gallery plugins with better security track records if timely patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-0750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in deanoakley Photoswipe Masonry Gallery
Description
The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.
AI-Powered Analysis
Technical Analysis
CVE-2022-0750 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Photoswipe Masonry Gallery WordPress plugin developed by deanoakley. This vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient escaping and sanitization of several parameters: thumbnail_width, thumbnail_height, max_image_width, and max_image_height. These parameters are handled in the photoswipe-masonry.php file. An authenticated attacker with at least limited privileges can exploit this flaw by injecting arbitrary web scripts into galleries created by the plugin or on the PhotoSwipe Options page. Because the vulnerability requires authentication but no user interaction, it allows an attacker who has access to the WordPress backend to execute malicious JavaScript code in the context of the victim’s browser. This can lead to session hijacking, defacement, or other attacks that leverage script execution. The vulnerability affects all versions up to and including 1.2.14 of the plugin. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or updates have been linked in the provided data. This vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper input sanitization leading to XSS.
Potential Impact
For European organizations using WordPress websites with the Photoswipe Masonry Gallery plugin, this vulnerability presents a tangible risk of unauthorized script execution within authenticated sessions. The impact includes potential theft of session cookies, unauthorized actions performed on behalf of legitimate users, and the injection of malicious content that could damage brand reputation or lead to data leakage. Since the vulnerability requires authentication, the risk is higher in environments where multiple users have backend access, such as agencies, content teams, or multi-user editorial platforms. Exploitation could facilitate lateral movement or privilege escalation within the web application environment. Given the widespread use of WordPress in Europe across various sectors including media, e-commerce, and government websites, the vulnerability could be leveraged to target sensitive information or disrupt services. However, the absence of known active exploits reduces immediate risk, but the medium severity score indicates that timely remediation is important to prevent future attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Photoswipe Masonry Gallery plugin, especially versions up to 1.2.14. If found, they should restrict plugin usage to trusted administrators only and review user privileges to minimize the number of accounts with authenticated access. Since no official patch is linked, organizations should monitor the plugin vendor’s repository or WordPress plugin directory for updates or security patches addressing CVE-2022-0750. In the interim, applying Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameters (thumbnail_width, thumbnail_height, max_image_width, max_image_height) can reduce exploitation risk. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Regular security training for administrators to recognize and report suspicious activity is also recommended. Finally, organizations should consider alternative gallery plugins with better security track records if timely patching is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-02-24T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbc6c
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:43:21 PM
Last updated: 2/7/2026, 1:01:50 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.