CVE-2024-10144

4.8 MEDIUM

📋 TL;DR

This vulnerability in the Rbs Image Gallery WordPress plugin allows high-privilege users (like contributors) to inject malicious scripts into plugin settings, which then execute when other users view affected pages. It affects WordPress sites using vulnerable plugin versions, particularly in multisite configurations where unfiltered_html is restricted.

💻 Affected Systems

Products:
  • Rbs Image Gallery WordPress Plugin
Versions: All versions before 3.2.22
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with plugin enabled and at least contributor-level user accounts. Particularly relevant for multisite installations where unfiltered_html capability is restricted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious contributor could inject persistent XSS payloads that steal admin credentials, redirect users to malicious sites, or perform actions as authenticated users across the entire WordPress site.

🟠

Likely Case

Contributor-level user injects malicious scripts that affect visitors or other users viewing gallery pages, potentially stealing session cookies or performing limited malicious actions.

🟢

If Mitigated

With proper user role management and content filtering, impact is limited to low-privilege script injection affecting only specific gallery pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher. Attack vector is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.22

Vendor Advisory: https://wpscan.com/vulnerability/a83521d3-0aba-493d-8dec-e764277e69b8/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Rbs Image Gallery' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.2.22+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict Contributor Access

all

Temporarily remove contributor role access or limit contributor accounts until patch is applied.

Disable Plugin

linux

Deactivate Rbs Image Gallery plugin if not essential for site functionality.

wp plugin deactivate rbs-image-gallery

🧯 If You Can't Patch

  • Implement strict user role management and audit contributor-level accounts
  • Add web application firewall rules to block XSS payloads in plugin parameter inputs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Rbs Image Gallery version. If version is below 3.2.22, site is vulnerable.

Check Version:

wp plugin list --name='rbs-image-gallery' --field=version

Verify Fix Applied:

Confirm plugin version is 3.2.22 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to gallery settings endpoints
  • Multiple failed XSS attempts in plugin-related logs

Network Indicators:

  • Script tags in gallery parameter requests
  • Unusual outbound connections from gallery pages

SIEM Query:

source="wordpress.log" AND "rbs-image-gallery" AND ("POST" OR "update") AND ("script" OR "onerror" OR "javascript:")

🔗 References

📤 Share & Export