VYPR
Medium severity5.5NVD Advisory· Published Apr 6, 2024· Updated Apr 8, 2026

CVE-2024-2296

CVE-2024-2296

Description

The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.8.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. CVE-2024-29833 appears to be a duplicate of this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The 10Web Photo Gallery plugin ≤1.8.21 stores SVG files without proper sanitization, allowing admin-level XSS on multisite or unfiltered_html-disabled sites.

Vulnerability

Overview

The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via SVG file uploads in all versions up to and including 1.8.21. The root cause is insufficient input sanitization and output escaping when handling SVG files, which allows malicious scripts embedded in the SVG to be stored and later executed in the context of any user visiting the affected page [1].

Attack

Prerequisites and Exploitation

Exploitation requires authenticated access with administrator-level privileges. The vulnerability is only exploitable on multi-site WordPress installations or on single-site installations where the unfiltered_html capability has been disabled. An attacker can upload a crafted SVG file containing JavaScript through the plugin's gallery upload functionality. When the SVG is rendered on a gallery page, the injected script executes in the browser of any user who views that page [1].

Impact

Successful exploitation allows the attacker to inject arbitrary web scripts into the context of the affected gallery page. This can lead to theft of authentication cookies, session tokens, or other sensitive data, as well as unauthorized actions performed on behalf of the victim user, such as page content modification or privilege escalation, depending on the victim's permissions [1].

Mitigation and

Patch Status

The vendor has released version 1.8.22 of the plugin, which resolves the vulnerability by properly sanitizing SVG file uploads. Users are strongly advised to update to version 1.8.22 or later. No workaround is provided besides updating the plugin [1]. Note that CVE-2024-29833 appears to be a duplicate of this issue.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.