CVE-2024-12119: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bradvin FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
The FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the default_gallery_title_size parameter in all versions up to, and including, 2.4.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with granted gallery and album creator roles, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2024-12119 is a stored cross-site scripting vulnerability identified in the FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress, maintained by bradvin. The vulnerability exists in all versions up to and including 2.4.29 and is caused by insufficient sanitization and escaping of the default_gallery_title_size parameter during web page generation. This parameter is used to set the gallery title size, but due to improper neutralization of input, an authenticated attacker with gallery or album creator roles can inject arbitrary JavaScript code. When other users access the pages containing the injected scripts, the malicious code executes in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires the attacker to have authenticated access with specific roles, but does not require user interaction to trigger the payload once the page is loaded. The CVSS v3.1 base score is 6.4, reflecting medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to impact on other users. No public exploits are currently known, but the vulnerability is publicly disclosed and enriched by CISA. The lack of official patches at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality and integrity within affected WordPress sites using the FooGallery plugin. Attackers with gallery or album creator roles can inject persistent malicious scripts that execute in the browsers of other users, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of victims. This can lead to account takeover, data leakage, and reputational damage for organizations. Since the vulnerability requires authenticated access, the risk is somewhat limited to environments where such roles are assigned to potentially untrusted users or where credential compromise is possible. However, given the widespread use of WordPress and the popularity of FooGallery for managing image galleries, a large number of websites globally could be affected. The vulnerability does not directly impact availability but can facilitate further attacks that degrade service or compromise site integrity.
Mitigation Recommendations
Administrators should immediately restrict gallery and album creator roles to trusted users only and audit existing users for unnecessary privileges. Until an official patch is released, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the default_gallery_title_size parameter. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor logs for unusual activity related to gallery management functions. Consider disabling or replacing the FooGallery plugin if immediate patching is not feasible. Once a patch is available, apply it promptly. Additionally, educate users with elevated roles about the risks of injecting untrusted content and enforce strong authentication mechanisms to reduce the risk of compromised credentials.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-12119: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bradvin FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
Description
The FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the default_gallery_title_size parameter in all versions up to, and including, 2.4.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with granted gallery and album creator roles, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-12119 is a stored cross-site scripting vulnerability identified in the FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress, maintained by bradvin. The vulnerability exists in all versions up to and including 2.4.29 and is caused by insufficient sanitization and escaping of the default_gallery_title_size parameter during web page generation. This parameter is used to set the gallery title size, but due to improper neutralization of input, an authenticated attacker with gallery or album creator roles can inject arbitrary JavaScript code. When other users access the pages containing the injected scripts, the malicious code executes in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability requires the attacker to have authenticated access with specific roles, but does not require user interaction to trigger the payload once the page is loaded. The CVSS v3.1 base score is 6.4, reflecting medium severity with network attack vector, low attack complexity, privileges required, no user interaction, and a scope change due to impact on other users. No public exploits are currently known, but the vulnerability is publicly disclosed and enriched by CISA. The lack of official patches at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality and integrity within affected WordPress sites using the FooGallery plugin. Attackers with gallery or album creator roles can inject persistent malicious scripts that execute in the browsers of other users, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions on behalf of victims. This can lead to account takeover, data leakage, and reputational damage for organizations. Since the vulnerability requires authenticated access, the risk is somewhat limited to environments where such roles are assigned to potentially untrusted users or where credential compromise is possible. However, given the widespread use of WordPress and the popularity of FooGallery for managing image galleries, a large number of websites globally could be affected. The vulnerability does not directly impact availability but can facilitate further attacks that degrade service or compromise site integrity.
Mitigation Recommendations
Administrators should immediately restrict gallery and album creator roles to trusted users only and audit existing users for unnecessary privileges. Until an official patch is released, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the default_gallery_title_size parameter. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. Regularly monitor logs for unusual activity related to gallery management functions. Consider disabling or replacing the FooGallery plugin if immediate patching is not feasible. Once a patch is available, apply it promptly. Additionally, educate users with elevated roles about the risks of injecting untrusted content and enforce strong authentication mechanisms to reduce the risk of compromised credentials.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-03T21:29:32.033Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6c67
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 2/28/2026, 11:39:38 AM
Last updated: 3/25/2026, 4:33:46 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.