CVE-2023-44244

7.1 HIGH

📋 TL;DR

Unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery WordPress plugin versions 2.2.44 and earlier. This allows attackers to inject malicious scripts via crafted URLs, which execute in victims' browsers when they visit the malicious link. WordPress sites using vulnerable FooGallery plugin versions are affected.

💻 Affected Systems

Products:
  • FooPlugins FooGallery WordPress Plugin
Versions: <= 2.2.44
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable FooGallery plugin versions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal admin session cookies, hijack administrator accounts, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise.

🟠

Likely Case

Attackers steal user session cookies, perform phishing attacks, or deface specific pages via injected content.

🟢

If Mitigated

Minimal impact if proper Content Security Policy (CSP) headers are implemented and user input validation/sanitization is enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited via phishing or malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.45 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find FooGallery plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution sources and mitigate XSS impact.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to Nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

Disable FooGallery Plugin

all

Temporarily disable vulnerable plugin until patched.

wp plugin deactivate foogallery

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in URLs.
  • Restrict plugin access to trusted users only via authentication requirements.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for FooGallery version <= 2.2.44.

Check Version:

wp plugin get foogallery --field=version

Verify Fix Applied:

Confirm FooGallery plugin version is 2.2.45 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with script tags or JavaScript payloads in access logs
  • Multiple 404 errors for crafted URLs containing XSS patterns

Network Indicators:

  • HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads

SIEM Query:

source="web_access_logs" url="*<script>*" OR url="*javascript:*"

🔗 References

📤 Share & Export