{"uuid": "97d18a6c-3d83-417e-95c6-196f8972640f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24362", "type": "seen", "source": "https://t.me/cibsecurity/27370", "content": "\u203c CVE-2021-24362 \u203c\n\nThe Photo Gallery by 10Web \u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u20ac\u0153 Mobile-Friendly Image Gallery WordPress plugin before 1.5.75 did not ensure that uploaded SVG files added to a gallery do not contain malicious content. As a result, users allowed to add images to gallery can upload an SVG file containing JavaScript code, which will be executed when accessing the image directly (ie in the /wp-content/uploads/photo-gallery/ folder), leading to a Cross-Site Scripting (XSS) issue\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T14:14:54.000000Z"}