id: CVE-2022-1946 info: name: Gallery < 2.0.0 - Reflected Cross-Site Scripting author: Akincibor severity: medium description: The plugin does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue. reference: - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940 - https://wordpress.org/plugins/gallery-album - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1946 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-1946 cwe-id: CWE-79 metadata: google-dork: inurl:"/wp-content/plugins/gallery-album/" verified: "true" tags: cve,cve2022,wp-plugin,xss,wp,wordpress,gallery,unauth requests: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=wpda_gall_load_image_info&start=0&limit=1&gallery_current_index=' matchers-condition: and matchers: - type: word part: body words: - 'wpdevar_gall_img_url_h[]' - type: word part: header words: - text/html - type: status status: - 200