CVE-2024-12237
📋 TL;DR
This SSRF vulnerability in the WordPress Photo Gallery Slideshow & Masonry Tiled Gallery plugin allows authenticated users (even with low-privilege Subscriber accounts) to make arbitrary web requests from the vulnerable server. Attackers can use this to probe internal networks and retrieve limited information from internal services. All WordPress sites using this plugin up to version 1.0.15 are affected.
💻 Affected Systems
- Photo Gallery Slideshow & Masonry Tiled Gallery WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal services, retrieve credentials or configuration data from internal endpoints, or use the vulnerable server as a proxy for attacks against internal infrastructure.
Likely Case
Attackers will use this to scan internal networks, identify internal services, and potentially retrieve limited information from misconfigured internal endpoints that don't require authentication.
If Mitigated
With proper network segmentation and internal service authentication, impact is limited to information disclosure about internal network structure and service availability.
🎯 Exploit Status
Exploitation requires WordPress authentication but only at Subscriber level (lowest privileged authenticated role). The vulnerability is in a publicly accessible AJAX callback function.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.16 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3157548/wp-responsive-photo-gallery/trunk/wp-responsive-photo-gallery.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Photo Gallery Slideshow & Masonry Tiled Gallery'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.0.16+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the plugin until patched
wp plugin deactivate wp-responsive-photo-gallery
Restrict AJAX endpoints
allUse web application firewall to block access to the vulnerable AJAX callback
# Add WAF rule to block requests to /wp-admin/admin-ajax.php with action=rjg_get_youtube_info_justified_gallery
🧯 If You Can't Patch
- Remove Subscriber role access or implement additional authentication for AJAX endpoints
- Implement network-level restrictions to prevent outbound requests from web servers to internal networks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Photo Gallery Slideshow & Masonry Tiled Gallery > Version. If version is 1.0.15 or lower, you are vulnerable.
Check Version:
wp plugin get wp-responsive-photo-gallery --field=version
Verify Fix Applied:
After update, verify plugin version shows 1.0.16 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with action=rjg_get_youtube_info_justified_gallery
- Web server making outbound requests to internal IP addresses or unusual domains
Network Indicators:
- Web server initiating HTTP requests to internal network segments
- Unusual outbound traffic patterns from web server to non-standard ports
SIEM Query:
source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data CONTAINS "action=rjg_get_youtube_info_justified_gallery"
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3023
- https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3044
- https://www.wordfence.com/threat-intel/vulnerabilities/id/08e44434-8908-4c63-9e5b-9a8b387255d9?source=cve