CVE-2024-35628
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Photo Gallery by 10Web WordPress plugin. It allows unauthorized users to perform actions that should require authentication, affecting all WordPress sites using vulnerable versions of this plugin. The vulnerability stems from improper access controls in the plugin's functionality.
💻 Affected Systems
- Photo Gallery by 10Web WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Unauthenticated attackers could modify gallery content, delete images, or potentially escalate privileges to gain administrative access to the WordPress site.
Likely Case
Unauthorized users could view or modify photo gallery content they shouldn't have access to, potentially defacing websites or accessing private images.
If Mitigated
With proper network segmentation and authentication controls, impact would be limited to the specific WordPress instance, preventing lateral movement.
🎯 Exploit Status
Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.26 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-23-broken-access-control-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Photo Gallery by 10Web'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.8.26+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate photo-gallery
Restrict Access
allUse web application firewall rules to restrict access to plugin endpoints
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the WordPress admin interface
- Enable WordPress security plugins that monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Photo Gallery by 10Web version number
Check Version:
wp plugin get photo-gallery --field=version
Verify Fix Applied:
Confirm plugin version is 1.8.26 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unauthorized POST requests to /wp-admin/admin-ajax.php with photo-gallery actions
- Multiple failed authentication attempts followed by successful gallery modifications
Network Indicators:
- Unusual traffic patterns to photo gallery endpoints from unauthenticated sources
SIEM Query:
source="wordpress.log" AND "photo-gallery" AND ("admin-ajax" OR "wp-admin") AND status=200 AND user="-"
🔗 References
- https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-23-broken-access-control-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-23-broken-access-control-vulnerability?_s_id=cve