Description
WordPress Plugin Gallery from files is prone to multiple vulnerabilities, including cross-site scripting and remote code execution vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to execute arbitrary code with the privileges of the user running the application, to compromise the application or the underlying database, to access or modify data or to compromise a vulnerable system. WordPress Plugin Gallery from files version 1.60 is vulnerable; prior versions may also be affected.
Remediation
Disable and remove the plugin until a fix is available
References
https://sploitus.com/exploit?id=WPEX-ID:426CF3B5-1BB7-4E81-B240-F3C962590721
https://sploitus.com/exploit?id=WPEX-ID:6BB4EB71-D702-4732-B01F-B723077D66CA
https://wordpress.org/plugins/gallery-from-files/#description
Related Vulnerabilities
WordPress Plugin Polls CP Multiple Vulnerabilities (1.0.8)
MySQL CVE-2023-22079 Vulnerability (CVE-2023-22079)
WordPress Plugin Web Application Firewall-website security Privilege Escalation (2.1.1)
WordPress Plugin Relevanssi-A Better Search SQL Injection (3.6.0)
Atlassian Jira Incorrect Authorization Vulnerability (CVE-2021-43948)