CVE-2024-2762

5.4 MEDIUM

📋 TL;DR

This vulnerability in FooGallery WordPress plugins allows users with Author role or higher to inject malicious scripts into gallery settings. These scripts execute when administrators view the affected pages, enabling cross-site scripting attacks against privileged users.

💻 Affected Systems

Products:
  • FooGallery WordPress plugin
  • FooGallery Premium WordPress plugin
Versions: All versions before 2.4.15
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least Author role access to exploit. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator accounts could be compromised, leading to complete site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Attackers with Author access could steal admin session cookies, perform actions as administrators, or deface the website.

🟢

If Mitigated

With proper role-based access controls and input validation, impact is limited to potential data exposure from the Author account itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Author-level access. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.15

Vendor Advisory: https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find FooGallery/FooGallery Premium. 4. Click 'Update Now' or manually update to version 2.4.15 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patching is possible

wp plugin deactivate foogallery
wp plugin deactivate foogallery-premium

Restrict Author Role Access

linux

Temporarily remove Author role users or restrict their capabilities

wp user list --role=author --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Enable WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins

Check Version:

wp plugin get foogallery --field=version

Verify Fix Applied:

Confirm plugin version is 2.4.15 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual gallery setting modifications by Author users
  • Multiple failed login attempts followed by gallery edits

Network Indicators:

  • Suspicious JavaScript payloads in POST requests to gallery settings endpoints

SIEM Query:

source="wordpress.log" AND ("foogallery" OR "gallery-setting") AND ("update" OR "edit") AND user_role="author"

🔗 References

📤 Share & Export