CVE-2024-5426: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 10web Photo Gallery by 10Web – Mobile-Friendly Image Gallery
CVE-2024-5426 is a stored cross-site scripting (XSS) vulnerability in the Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin, affecting all versions up to 1. 8. 23. The flaw arises from insufficient sanitization and escaping of the 'svg' parameter, allowing authenticated users with at least contributor privileges (in pro versions) or administrators (in default versions) to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require some level of authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation. The threat is most relevant to countries with high WordPress usage and significant adoption of this plugin, including the United States, United Kingdom, Germany, Canada, Australia, and India.
AI Analysis
Technical Summary
CVE-2024-5426 is a stored cross-site scripting (XSS) vulnerability identified in the Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress, affecting all versions up to and including 1.8.23. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and output escaping of the 'svg' parameter. This flaw allows authenticated attackers—administrators by default, and contributors in pro versions—to inject arbitrary JavaScript code into pages managed by the plugin. When any user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to various attack scenarios including session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, or defacement of the website. The vulnerability requires authentication but no user interaction beyond visiting the infected page. The CVSS v3.1 base score is 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed due to potential impact on other users viewing the injected content. No public exploits or active exploitation have been reported yet. The plugin’s widespread use in WordPress sites, especially those relying on image galleries, makes this a significant concern for website administrators. The lack of a patch link suggests that remediation may require updates from the vendor or manual mitigation steps.
Potential Impact
The impact of CVE-2024-5426 is primarily on the confidentiality and integrity of affected websites and their users. Successful exploitation allows attackers to execute arbitrary scripts in the context of the vulnerable site, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. This can damage the reputation of organizations, lead to data breaches, and compromise user trust. Since the vulnerability requires authenticated access, the risk is somewhat mitigated but remains significant in environments where multiple users have elevated privileges or where contributor roles are extended in pro versions. The scope of impact includes all visitors to the compromised pages, increasing the potential damage. Organizations relying on the affected plugin for public-facing galleries or internal portals may face defacement or data leakage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is public. Overall, the vulnerability poses a moderate risk to organizations globally, especially those with high WordPress usage and reliance on this plugin.
Mitigation Recommendations
1. Immediately update the Photo Gallery by 10Web plugin to a fixed version once released by the vendor. Monitor official 10Web channels for patch announcements. 2. Until a patch is available, restrict plugin usage to trusted administrators only and disable contributor or lower privilege access to the plugin features, especially in pro versions. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'svg' parameter, focusing on script injection patterns. 4. Conduct regular security audits and code reviews of customizations involving the plugin to identify and sanitize any user inputs. 5. Educate administrators and contributors about the risks of injecting untrusted content and enforce strict content policies. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 7. Monitor website logs and user reports for signs of XSS exploitation or unusual behavior. 8. Consider temporarily disabling the plugin if it is not critical to operations until a secure version is deployed.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-5426: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 10web Photo Gallery by 10Web – Mobile-Friendly Image Gallery
Description
CVE-2024-5426 is a stored cross-site scripting (XSS) vulnerability in the Photo Gallery by 10Web – Mobile-Friendly Image Gallery WordPress plugin, affecting all versions up to 1. 8. 23. The flaw arises from insufficient sanitization and escaping of the 'svg' parameter, allowing authenticated users with at least contributor privileges (in pro versions) or administrators (in default versions) to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or defacement. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require some level of authenticated access. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent exploitation. The threat is most relevant to countries with high WordPress usage and significant adoption of this plugin, including the United States, United Kingdom, Germany, Canada, Australia, and India.
AI-Powered Analysis
Technical Analysis
CVE-2024-5426 is a stored cross-site scripting (XSS) vulnerability identified in the Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress, affecting all versions up to and including 1.8.23. The vulnerability stems from improper neutralization of input during web page generation, specifically inadequate sanitization and output escaping of the 'svg' parameter. This flaw allows authenticated attackers—administrators by default, and contributors in pro versions—to inject arbitrary JavaScript code into pages managed by the plugin. When any user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to various attack scenarios including session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, or defacement of the website. The vulnerability requires authentication but no user interaction beyond visiting the infected page. The CVSS v3.1 base score is 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed due to potential impact on other users viewing the injected content. No public exploits or active exploitation have been reported yet. The plugin’s widespread use in WordPress sites, especially those relying on image galleries, makes this a significant concern for website administrators. The lack of a patch link suggests that remediation may require updates from the vendor or manual mitigation steps.
Potential Impact
The impact of CVE-2024-5426 is primarily on the confidentiality and integrity of affected websites and their users. Successful exploitation allows attackers to execute arbitrary scripts in the context of the vulnerable site, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. This can damage the reputation of organizations, lead to data breaches, and compromise user trust. Since the vulnerability requires authenticated access, the risk is somewhat mitigated but remains significant in environments where multiple users have elevated privileges or where contributor roles are extended in pro versions. The scope of impact includes all visitors to the compromised pages, increasing the potential damage. Organizations relying on the affected plugin for public-facing galleries or internal portals may face defacement or data leakage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is public. Overall, the vulnerability poses a moderate risk to organizations globally, especially those with high WordPress usage and reliance on this plugin.
Mitigation Recommendations
1. Immediately update the Photo Gallery by 10Web plugin to a fixed version once released by the vendor. Monitor official 10Web channels for patch announcements. 2. Until a patch is available, restrict plugin usage to trusted administrators only and disable contributor or lower privilege access to the plugin features, especially in pro versions. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the 'svg' parameter, focusing on script injection patterns. 4. Conduct regular security audits and code reviews of customizations involving the plugin to identify and sanitize any user inputs. 5. Educate administrators and contributors about the risks of injecting untrusted content and enforce strict content policies. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected pages. 7. Monitor website logs and user reports for signs of XSS exploitation or unusual behavior. 8. Consider temporarily disabling the plugin if it is not critical to operations until a secure version is deployed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-05-27T19:35:22.878Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6be7b7ef31ef0b55bf86
Added to database: 2/25/2026, 9:38:47 PM
Last enriched: 2/26/2026, 2:34:39 AM
Last updated: 2/26/2026, 8:07:16 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.