header-logo
Suggest Exploit
vendor:
Lazyest Gallery WordPress Plugin
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: Lazyest Gallery WordPress Plugin
Affected Version From: 1.0.26
Affected Version To: Unknown (other versions may also be affected)
Patch Exists: NO
Related CWE:
CPE: a:lazyest_gallery_project:lazyest_gallery_wordpress_plugin:1.0.26
Metasploit:
Other Scripts:
Platforms Tested: WordPress (platform), Linux, Windows, Mac (potentially affected platforms)
Unknown

Cross-Site Scripting in Lazyest Gallery WordPress Plugin

The Lazyest Gallery WordPress Plugin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to update to the latest version of the Lazyest Gallery WordPress Plugin, which should include a fix for this issue. Additionally, it is good security practice to sanitize and validate user-supplied input before processing it.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/46823/info

The Lazyest Gallery WordPress Plugin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Lazyest Gallery WordPress Plugin 1.0.26 is vulnerable; other versions may also be affected. 

http://www.example.com/wp-content/plugins/lazyest-gallery/lazyest-popup.php?image=%3C/title%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E