CVE-2024-12696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Picture Gallery – Frontend Image Uploads, AJAX Photo List
CVE-2024-12696 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' by videowhisper, affecting all versions up to 1. 5. 22. The flaw arises from improper input sanitization and output escaping in the plugin's videowhisper_picture_upload_guest shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), with no known exploits in the wild yet. Mitigation requires plugin updates or manual input validation and output escaping. Organizations using this plugin on WordPress sites should prioritize patching or applying workarounds to prevent exploitation. Countries with significant WordPress usage and active videowhisper plugin deployments are most at risk.
AI Analysis
Technical Summary
CVE-2024-12696 is a stored cross-site scripting vulnerability classified under CWE-79, found in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' developed by videowhisper. The vulnerability exists in all versions up to and including 1.5.22, due to insufficient sanitization and escaping of user-supplied input in the videowhisper_picture_upload_guest shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further malware. The vulnerability does not require user interaction beyond viewing the affected page and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. No public exploits have been reported yet, but the presence of stored XSS in a popular WordPress plugin poses a significant risk to websites that rely on this plugin for frontend image uploads and AJAX photo listing functionality.
Potential Impact
The primary impact of CVE-2024-12696 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers can execute arbitrary scripts in the context of the victim’s browser, leading to session hijacking, credential theft, unauthorized actions, or defacement. This can erode user trust, damage brand reputation, and potentially lead to further compromise of the web application or connected systems. Since the vulnerability requires contributor-level access, attackers must first gain some level of authenticated access, which may be feasible through social engineering or exploiting other vulnerabilities. The vulnerability affects any organization using the vulnerable plugin, including businesses, educational institutions, and government websites, especially those relying on user-generated content or frontend image uploads. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. The medium CVSS score reflects a moderate but actionable threat that organizations should address promptly to prevent exploitation.
Mitigation Recommendations
1. Update the 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' plugin to the latest version once a patch is released by videowhisper. 2. If no patch is available, implement manual input validation and output escaping on all user-supplied attributes processed by the videowhisper_picture_upload_guest shortcode to neutralize malicious scripts. 3. Restrict contributor-level access to trusted users only and review user permissions regularly to minimize the risk of insider threats. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting this plugin. 5. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 6. Educate site administrators and content contributors about the risks of XSS and safe content submission practices. 7. Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-12696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Picture Gallery – Frontend Image Uploads, AJAX Photo List
Description
CVE-2024-12696 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' by videowhisper, affecting all versions up to 1. 5. 22. The flaw arises from improper input sanitization and output escaping in the plugin's videowhisper_picture_upload_guest shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), with no known exploits in the wild yet. Mitigation requires plugin updates or manual input validation and output escaping. Organizations using this plugin on WordPress sites should prioritize patching or applying workarounds to prevent exploitation. Countries with significant WordPress usage and active videowhisper plugin deployments are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12696 is a stored cross-site scripting vulnerability classified under CWE-79, found in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' developed by videowhisper. The vulnerability exists in all versions up to and including 1.5.22, due to insufficient sanitization and escaping of user-supplied input in the videowhisper_picture_upload_guest shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further malware. The vulnerability does not require user interaction beyond viewing the affected page and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. No public exploits have been reported yet, but the presence of stored XSS in a popular WordPress plugin poses a significant risk to websites that rely on this plugin for frontend image uploads and AJAX photo listing functionality.
Potential Impact
The primary impact of CVE-2024-12696 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers can execute arbitrary scripts in the context of the victim’s browser, leading to session hijacking, credential theft, unauthorized actions, or defacement. This can erode user trust, damage brand reputation, and potentially lead to further compromise of the web application or connected systems. Since the vulnerability requires contributor-level access, attackers must first gain some level of authenticated access, which may be feasible through social engineering or exploiting other vulnerabilities. The vulnerability affects any organization using the vulnerable plugin, including businesses, educational institutions, and government websites, especially those relying on user-generated content or frontend image uploads. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. The medium CVSS score reflects a moderate but actionable threat that organizations should address promptly to prevent exploitation.
Mitigation Recommendations
1. Update the 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' plugin to the latest version once a patch is released by videowhisper. 2. If no patch is available, implement manual input validation and output escaping on all user-supplied attributes processed by the videowhisper_picture_upload_guest shortcode to neutralize malicious scripts. 3. Restrict contributor-level access to trusted users only and review user permissions regularly to minimize the risk of insider threats. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting this plugin. 5. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 6. Educate site administrators and content contributors about the risks of XSS and safe content submission practices. 7. Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-16T22:10:48.032Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e46b7ef31ef0b59c2b4
Added to database: 2/25/2026, 9:48:54 PM
Last enriched: 2/26/2026, 3:13:26 AM
Last updated: 2/26/2026, 11:38:34 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.