CVE-2024-8670: CWE-79 Cross-Site Scripting (XSS) in Unknown Photo Gallery by 10Web
The Photo Gallery by 10Web WordPress plugin before 1.8.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-8670 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Photo Gallery by 10Web' in versions prior to 1.8.29. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are stored and later executed in the context of other users viewing the affected content. Notably, this vulnerability can be exploited even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and requiring user interaction (UI:R). The impact is limited to confidentiality and integrity, with no direct availability impact. The vulnerability is scoped (S:C), meaning the attack can affect resources beyond the vulnerable component. There are no known exploits in the wild at this time, and no patch links were provided, but it is expected that updating to version 1.8.29 or later would remediate the issue. Stored XSS vulnerabilities can allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or other malicious actions depending on the victim's privileges and the context of the injected script.
Potential Impact
For European organizations using WordPress sites with the Photo Gallery by 10Web plugin, this vulnerability poses a risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While the vulnerability requires high privileges to exploit, it can bypass certain WordPress security restrictions, increasing the risk in multisite environments common in larger organizations. The impact could be significant for organizations relying on these sites for public-facing content or internal collaboration, as attackers could leverage the XSS to conduct phishing, steal credentials, or implant further malware. However, since no known exploits are currently reported, the immediate risk is moderate but warrants proactive mitigation. The vulnerability does not directly affect availability, so denial of service is unlikely. Given the widespread use of WordPress across Europe, organizations in sectors such as media, education, government, and e-commerce could be affected if they use this plugin and do not update promptly.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Photo Gallery by 10Web plugin and identify the version in use. If the version is prior to 1.8.29, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can implement temporary mitigations such as restricting administrative access to trusted personnel only, enabling strict Content Security Policy (CSP) headers to limit script execution, and monitoring logs for suspicious activity indicative of XSS exploitation attempts. Additionally, reviewing and hardening user roles and capabilities to minimize the number of users with high privileges can reduce the attack surface. Web Application Firewalls (WAFs) with XSS detection rules can provide an additional layer of defense. Regular security audits and penetration testing focused on plugin vulnerabilities should be conducted to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2024-8670: CWE-79 Cross-Site Scripting (XSS) in Unknown Photo Gallery by 10Web
Description
The Photo Gallery by 10Web WordPress plugin before 1.8.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-8670 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin 'Photo Gallery by 10Web' in versions prior to 1.8.29. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing high-privilege users, such as administrators, to inject malicious scripts that are stored and later executed in the context of other users viewing the affected content. Notably, this vulnerability can be exploited even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and requiring user interaction (UI:R). The impact is limited to confidentiality and integrity, with no direct availability impact. The vulnerability is scoped (S:C), meaning the attack can affect resources beyond the vulnerable component. There are no known exploits in the wild at this time, and no patch links were provided, but it is expected that updating to version 1.8.29 or later would remediate the issue. Stored XSS vulnerabilities can allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or other malicious actions depending on the victim's privileges and the context of the injected script.
Potential Impact
For European organizations using WordPress sites with the Photo Gallery by 10Web plugin, this vulnerability poses a risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While the vulnerability requires high privileges to exploit, it can bypass certain WordPress security restrictions, increasing the risk in multisite environments common in larger organizations. The impact could be significant for organizations relying on these sites for public-facing content or internal collaboration, as attackers could leverage the XSS to conduct phishing, steal credentials, or implant further malware. However, since no known exploits are currently reported, the immediate risk is moderate but warrants proactive mitigation. The vulnerability does not directly affect availability, so denial of service is unlikely. Given the widespread use of WordPress across Europe, organizations in sectors such as media, education, government, and e-commerce could be affected if they use this plugin and do not update promptly.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Photo Gallery by 10Web plugin and identify the version in use. If the version is prior to 1.8.29, they should prioritize updating to the latest version as soon as it becomes available. In the absence of an official patch, organizations can implement temporary mitigations such as restricting administrative access to trusted personnel only, enabling strict Content Security Policy (CSP) headers to limit script execution, and monitoring logs for suspicious activity indicative of XSS exploitation attempts. Additionally, reviewing and hardening user roles and capabilities to minimize the number of users with high privileges can reduce the attack surface. Web Application Firewalls (WAFs) with XSS detection rules can provide an additional layer of defense. Regular security audits and penetration testing focused on plugin vulnerabilities should be conducted to identify and remediate similar issues proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-09-10T17:51:14.607Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeac6a
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/6/2025, 6:56:58 AM
Last updated: 7/26/2025, 12:55:34 PM
Views: 11
Related Threats
CVE-2025-8081: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumCVE-2025-6253: CWE-862 Missing Authorization in uicore UiCore Elements – Free Elementor widgets and templates
HighCVE-2025-3892: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS
MediumCVE-2025-30027: CWE-1287: Improper Validation of Specified Type of Input in Axis Communications AB AXIS OS
MediumCVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.