Skip to main content

CVE-2024-8670: CWE-79 Cross-Site Scripting (XSS) in Unknown Photo Gallery by 10Web

Medium
VulnerabilityCVE-2024-8670cvecve-2024-8670cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:17 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Photo Gallery by 10Web

Description

The Photo Gallery by 10Web WordPress plugin before 1.8.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/06/2025, 06:56:58 UTC

Technical Analysis

CVE-2024-8670 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Photo Gallery by 10Web' in versions prior to 1.8.29. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are stored and later executed in the context of other users viewing the affected content. Notably, this vulnerability can be exploited even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and requiring user interaction (UI:R). The impact is limited to confidentiality and integrity, with no direct availability impact. The vulnerability is scoped (S:C), meaning the attack can affect resources beyond the vulnerable component. There are no known exploits in the wild at this time, and no patch links were provided, but it is expected that updating to version 1.8.29 or later would remediate the issue. Stored XSS vulnerabilities can allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or other malicious actions depending on the victim's privileges and the context of the injected script.

Potential Impact

For European organizations using WordPress sites with the Photo Gallery by 10Web plugin, this vulnerability poses a risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While the vulnerability requires high privileges to exploit, it can bypass certain WordPress security restrictions, increasing the risk in multisite environments common in larger organizations. The impact could be significant for organizations relying on these sites for public-facing content or internal collaboration, as attackers could leverage the XSS to conduct phishing, steal credentials, or implant further malware. However, since no known exploits are currently reported, the immediate risk is moderate but warrants proactive mitigation. The vulnerability does not directly affect availability, so denial of service is unlikely. Given the widespread use of WordPress across Europe, organizations in sectors such as media, education, government, and e-commerce could be affected if they use this plugin and do not update promptly.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the Photo Gallery by 10Web plugin and identify the version in use. If the version is prior to 1.8.29, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can implement temporary mitigations such as restricting administrative access to trusted personnel only, enabling strict Content Security Policy (CSP) headers to limit script execution, and monitoring logs for suspicious activity indicative of XSS exploitation attempts. Additionally, reviewing and hardening user roles and capabilities to minimize the number of users with high privileges can reduce the attack surface. Web Application Firewalls (WAFs) with XSS detection rules can provide an additional layer of defense. Regular security audits and penetration testing focused on plugin vulnerabilities should be conducted to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-09-10T17:51:14.607Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac6a

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/6/2025, 6:56:58 AM

Last updated: 7/26/2025, 12:55:34 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats