Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12696: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in videowhisper Picture Gallery – Frontend Image Uploads, AJAX Photo List

0
Medium
VulnerabilityCVE-2024-12696cvecve-2024-12696cwe-79
Published: Sat Jan 18 2025 (01/18/2025, 07:05:10 UTC)
Source: CVE Database V5
Vendor/Project: videowhisper
Product: Picture Gallery – Frontend Image Uploads, AJAX Photo List

Description

CVE-2024-12696 is a stored cross-site scripting (XSS) vulnerability in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' by videowhisper, affecting all versions up to 1. 5. 22. The flaw arises from improper input sanitization and output escaping in the plugin's videowhisper_picture_upload_guest shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity), with no known exploits in the wild yet. Mitigation requires plugin updates or manual input validation and output escaping. Organizations using this plugin on WordPress sites should prioritize patching or applying workarounds to prevent exploitation. Countries with significant WordPress usage and active videowhisper plugin deployments are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:13:26 UTC

Technical Analysis

CVE-2024-12696 is a stored cross-site scripting vulnerability classified under CWE-79, found in the WordPress plugin 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' developed by videowhisper. The vulnerability exists in all versions up to and including 1.5.22, due to insufficient sanitization and escaping of user-supplied input in the videowhisper_picture_upload_guest shortcode. Authenticated attackers with contributor-level privileges or higher can exploit this flaw by injecting arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the injected scripts execute in their browsers, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further malware. The vulnerability does not require user interaction beyond viewing the affected page and has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and no user interaction required. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges. No public exploits have been reported yet, but the presence of stored XSS in a popular WordPress plugin poses a significant risk to websites that rely on this plugin for frontend image uploads and AJAX photo listing functionality.

Potential Impact

The primary impact of CVE-2024-12696 is the compromise of confidentiality and integrity of user sessions and data on affected WordPress sites. Attackers can execute arbitrary scripts in the context of the victim’s browser, leading to session hijacking, credential theft, unauthorized actions, or defacement. This can erode user trust, damage brand reputation, and potentially lead to further compromise of the web application or connected systems. Since the vulnerability requires contributor-level access, attackers must first gain some level of authenticated access, which may be feasible through social engineering or exploiting other vulnerabilities. The vulnerability affects any organization using the vulnerable plugin, including businesses, educational institutions, and government websites, especially those relying on user-generated content or frontend image uploads. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. The medium CVSS score reflects a moderate but actionable threat that organizations should address promptly to prevent exploitation.

Mitigation Recommendations

1. Update the 'Picture Gallery – Frontend Image Uploads, AJAX Photo List' plugin to the latest version once a patch is released by videowhisper. 2. If no patch is available, implement manual input validation and output escaping on all user-supplied attributes processed by the videowhisper_picture_upload_guest shortcode to neutralize malicious scripts. 3. Restrict contributor-level access to trusted users only and review user permissions regularly to minimize the risk of insider threats. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting this plugin. 5. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 6. Educate site administrators and content contributors about the risks of XSS and safe content submission practices. 7. Consider disabling or replacing the vulnerable plugin with alternative solutions that follow secure coding practices if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-16T22:10:48.032Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e46b7ef31ef0b59c2b4

Added to database: 2/25/2026, 9:48:54 PM

Last enriched: 2/26/2026, 3:13:26 AM

Last updated: 2/26/2026, 11:38:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats