Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-0750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in deanoakley Photoswipe Masonry Gallery

0
Medium
VulnerabilityCVE-2022-0750cvecve-2022-0750cwe-79
Published: Wed Mar 23 2022 (03/23/2022, 19:46:50 UTC)
Source: CVE
Vendor/Project: deanoakley
Product: Photoswipe Masonry Gallery

Description

The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:43:21 UTC

Technical Analysis

CVE-2022-0750 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Photoswipe Masonry Gallery WordPress plugin developed by deanoakley. This vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient escaping and sanitization of several parameters: thumbnail_width, thumbnail_height, max_image_width, and max_image_height. These parameters are handled in the photoswipe-masonry.php file. An authenticated attacker with at least limited privileges can exploit this flaw by injecting arbitrary web scripts into galleries created by the plugin or on the PhotoSwipe Options page. Because the vulnerability requires authentication but no user interaction, it allows an attacker who has access to the WordPress backend to execute malicious JavaScript code in the context of the victim’s browser. This can lead to session hijacking, defacement, or other attacks that leverage script execution. The vulnerability affects all versions up to and including 1.2.14 of the plugin. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or updates have been linked in the provided data. This vulnerability is categorized under CWE-79, which is a common and well-understood class of web application security issues related to improper input sanitization leading to XSS.

Potential Impact

For European organizations using WordPress websites with the Photoswipe Masonry Gallery plugin, this vulnerability presents a tangible risk of unauthorized script execution within authenticated sessions. The impact includes potential theft of session cookies, unauthorized actions performed on behalf of legitimate users, and the injection of malicious content that could damage brand reputation or lead to data leakage. Since the vulnerability requires authentication, the risk is higher in environments where multiple users have backend access, such as agencies, content teams, or multi-user editorial platforms. Exploitation could facilitate lateral movement or privilege escalation within the web application environment. Given the widespread use of WordPress in Europe across various sectors including media, e-commerce, and government websites, the vulnerability could be leveraged to target sensitive information or disrupt services. However, the absence of known active exploits reduces immediate risk, but the medium severity score indicates that timely remediation is important to prevent future attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Photoswipe Masonry Gallery plugin, especially versions up to 1.2.14. If found, they should restrict plugin usage to trusted administrators only and review user privileges to minimize the number of accounts with authenticated access. Since no official patch is linked, organizations should monitor the plugin vendor’s repository or WordPress plugin directory for updates or security patches addressing CVE-2022-0750. In the interim, applying Web Application Firewall (WAF) rules that detect and block suspicious payloads targeting the vulnerable parameters (thumbnail_width, thumbnail_height, max_image_width, max_image_height) can reduce exploitation risk. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Regular security training for administrators to recognize and report suspicious activity is also recommended. Finally, organizations should consider alternative gallery plugins with better security track records if timely patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2022-02-24T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbc6c

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:43:21 PM

Last updated: 2/7/2026, 1:01:50 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats