
Cloud Vulnerability DB
A community-led vulnerabilities database
The Video Gallery WordPress plugin before version 1.1.5 contains a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2021-24515. The vulnerability was discovered in the plugin's handling of video titles and descriptions within galleries, where the content is not properly escaped before being output in HTML attributes (WPScan).
The vulnerability stems from improper output escaping of video titles and descriptions in gallery attributes. The issue is classified as CWE-79 (Cross-site Scripting) with a CVSS score of 3.4 (low severity). The vulnerability affects the smart-grid-gallery plugin and was fixed in version 1.1.5 (WPScan).
When exploited, this vulnerability allows attackers to inject malicious JavaScript code through video titles and descriptions, which executes when users interact with the affected gallery elements. This can lead to potential client-side attacks against WordPress site administrators and users (WPScan).
The vulnerability has been patched in Video Gallery version 1.1.5. Users are advised to update to this version or later to mitigate the security risk. No alternative workarounds have been published (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."