CVE-2024-13384: CWE-79 Cross-Site Scripting (XSS) in Unknown Photo Gallery, Images, Slider in Rbs Image Gallery
The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.24 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-13384 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Photo Gallery, Images, Slider component of the Rbs Image Gallery WordPress plugin, affecting versions prior to 3.2.24. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored and later executed in the context of other users viewing the affected gallery pages. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts HTML input to trusted users. The CVSS 3.1 base score of 4.8 reflects a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges, and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by a malicious administrator or compromised admin account to execute arbitrary JavaScript in the context of other users, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment. The absence of a patch link suggests that a fix may not yet be publicly available or is pending release. Given the plugin's use in WordPress sites, the vulnerability primarily threatens websites that utilize this specific plugin version and have multiple users or multisite configurations where privilege separation is critical.
Potential Impact
For European organizations, especially those operating WordPress-based websites with multiple administrators or multisite setups, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized disclosure of sensitive information, such as session tokens or personal data, through malicious script execution. This can undermine user trust, violate data protection regulations like the GDPR, and potentially lead to reputational damage or regulatory penalties. The fact that high privilege users are required to exploit the vulnerability somewhat limits the attack surface; however, insider threats or compromised admin accounts could be leveraged by attackers. Additionally, organizations in sectors with high web presence—such as e-commerce, media, education, and government—may be targeted to gain footholds or pivot to internal networks. The vulnerability's ability to bypass unfiltered_html restrictions in multisite environments is particularly concerning for large organizations or hosting providers managing multiple client sites, increasing the risk of widespread impact if exploited.
Mitigation Recommendations
Organizations should immediately verify if they are using the Rbs Image Gallery WordPress plugin and identify the version in use. If the plugin version is prior to 3.2.24, it is critical to upgrade to the latest version once available. In the absence of an official patch, administrators should consider temporarily disabling or removing the plugin to mitigate risk. Additionally, review and restrict administrative privileges to only trusted personnel, implement strong authentication mechanisms (e.g., MFA) for admin accounts, and monitor admin activities for suspicious behavior. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting the execution of unauthorized scripts. Regularly audit multisite configurations and plugin settings to ensure no unauthorized changes have been made. Finally, maintain up-to-date backups and have an incident response plan ready to address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-13384: CWE-79 Cross-Site Scripting (XSS) in Unknown Photo Gallery, Images, Slider in Rbs Image Gallery
Description
The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.24 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-13384 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the Photo Gallery, Images, Slider component of the Rbs Image Gallery WordPress plugin, affecting versions prior to 3.2.24. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored and later executed in the context of other users viewing the affected gallery pages. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts HTML input to trusted users. The CVSS 3.1 base score of 4.8 reflects a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges, and user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by a malicious administrator or compromised admin account to execute arbitrary JavaScript in the context of other users, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress environment. The absence of a patch link suggests that a fix may not yet be publicly available or is pending release. Given the plugin's use in WordPress sites, the vulnerability primarily threatens websites that utilize this specific plugin version and have multiple users or multisite configurations where privilege separation is critical.
Potential Impact
For European organizations, especially those operating WordPress-based websites with multiple administrators or multisite setups, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized disclosure of sensitive information, such as session tokens or personal data, through malicious script execution. This can undermine user trust, violate data protection regulations like the GDPR, and potentially lead to reputational damage or regulatory penalties. The fact that high privilege users are required to exploit the vulnerability somewhat limits the attack surface; however, insider threats or compromised admin accounts could be leveraged by attackers. Additionally, organizations in sectors with high web presence—such as e-commerce, media, education, and government—may be targeted to gain footholds or pivot to internal networks. The vulnerability's ability to bypass unfiltered_html restrictions in multisite environments is particularly concerning for large organizations or hosting providers managing multiple client sites, increasing the risk of widespread impact if exploited.
Mitigation Recommendations
Organizations should immediately verify if they are using the Rbs Image Gallery WordPress plugin and identify the version in use. If the plugin version is prior to 3.2.24, it is critical to upgrade to the latest version once available. In the absence of an official patch, administrators should consider temporarily disabling or removing the plugin to mitigate risk. Additionally, review and restrict administrative privileges to only trusted personnel, implement strong authentication mechanisms (e.g., MFA) for admin accounts, and monitor admin activities for suspicious behavior. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting the execution of unauthorized scripts. Regularly audit multisite configurations and plugin settings to ensure no unauthorized changes have been made. Finally, maintain up-to-date backups and have an incident response plan ready to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-01-14T14:47:15.109Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec221
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:42:45 AM
Last updated: 8/15/2025, 6:37:14 AM
Views: 17
Related Threats
CVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.