header-logo
Suggest Exploit
vendor:
flash-album-gallery WordPress Plugin
by:
Unknown
6.1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: flash-album-gallery WordPress Plugin
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:flash-album-gallery:flash-album-gallery
Metasploit:
Other Scripts:
Platforms Tested: WordPress
2012

flash-album-gallery WordPress Plugin Cross-Site Scripting Vulnerability

The flash-album-gallery plugin for WordPress is vulnerable to a cross-site scripting (XSS) attack due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability by injecting malicious script code through the 'pid' parameter in the 'flagshow.php' file. This can lead to the execution of arbitrary script code in the victim's browser, allowing the attacker to potentially steal authentication credentials and launch further attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to update the flash-album-gallery plugin to the latest version available. Additionally, input validation and sanitization techniques should be implemented to ensure that user-supplied data is properly handled and rendered.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/51031/info

flash-album-gallery plug-in for WordPress is prone to a cross-site-scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/[path]/wp-content/plugins/flash-album-gallery/flagshow.php?pid=[xss]