CVE-2024-9769
📋 TL;DR
This stored XSS vulnerability in the Video Gallery WordPress plugin allows authenticated administrators to inject malicious scripts into admin settings pages. The injected scripts execute when other users view those pages. Only affects WordPress multisite installations or sites where unfiltered_html capability is disabled.
💻 Affected Systems
- Video Gallery – Best WordPress YouTube Gallery
📦 What is this software?
Video Gallery by Total Soft
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full site takeover, data theft, or malware distribution to site visitors.
Likely Case
Privilege escalation where lower-privileged administrators can execute scripts with higher privileges, potentially stealing session cookies or performing unauthorized actions.
If Mitigated
Limited impact due to requiring administrator credentials and specific WordPress configurations.
🎯 Exploit Status
Requires administrator credentials. Exploitation is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.2 or later
Vendor Advisory: https://wordpress.org/plugins/gallery-for-youtube/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Video Gallery – Best WordPress YouTube Gallery'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.4.2+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Video Gallery plugin until patched
wp plugin deactivate gallery-for-youtube
Enable unfiltered_html for admins
allEnable unfiltered_html capability for administrator roles (not recommended for security)
Add define('DISALLOW_UNFILTERED_HTML', false); to wp-config.php
🧯 If You Can't Patch
- Remove administrator access from untrusted users
- Implement web application firewall rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Video Gallery version. If version is 2.4.1 or lower, you are vulnerable if using multisite or unfiltered_html disabled.
Check Version:
wp plugin get gallery-for-youtube --field=version
Verify Fix Applied:
Verify plugin version is 2.4.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin.php?page=video-gallery-settings
- JavaScript payloads in plugin settings fields
Network Indicators:
- Suspicious script tags in HTTP responses from admin pages
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin.php" AND uri_query="page=video-gallery-settings") AND (http_method="POST")