CVE-2025-0613

6.1 MEDIUM

📋 TL;DR

The Photo Gallery by 10Web WordPress plugin before version 1.8.34 contains a stored cross-site scripting (XSS) vulnerability. Unauthenticated attackers can inject malicious scripts into image comments, which execute when other users view those comments. This affects all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • Photo Gallery by 10Web WordPress plugin
Versions: All versions before 1.8.34
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration. Any WordPress site with the vulnerable plugin enabled is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress admin accounts, deface websites, or redirect users to malicious sites, potentially leading to complete site compromise.

🟠

Likely Case

Attackers will typically inject scripts to steal user session cookies or credentials, potentially compromising user accounts and performing actions on their behalf.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts would be neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Stored XSS vulnerabilities are commonly exploited. The unauthenticated nature makes this particularly attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.34

Vendor Advisory: https://wpscan.com/vulnerability/22be2b44-cd42-4b02-8448-59dd2989dde1/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Photo Gallery by 10Web'. 4. Click 'Update Now' if available, or download version 1.8.34+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable comment functionality

all

Temporarily disable image comments in plugin settings to prevent exploitation

Disable plugin

linux

Deactivate the Photo Gallery plugin until patched

wp plugin deactivate photo-gallery

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules
  • Restrict access to the WordPress admin area to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Photo Gallery by 10Web → Version. If version is below 1.8.34, you are vulnerable.

Check Version:

wp plugin get photo-gallery --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.8.34 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual comment submissions containing script tags or JavaScript code
  • Multiple comment attempts from single IP addresses

Network Indicators:

  • HTTP POST requests to comment submission endpoints with suspicious payloads

SIEM Query:

source="wordpress.log" AND "POST /wp-admin/admin-ajax.php" AND "action=bwg_frontend_data" AND ("<script>" OR "javascript:")

🔗 References

📤 Share & Export