WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft. | |
| Title | WordPress Picture Gallery 1.4.2 Stored XSS via Edit Content URL | |
| First Time appeared |
Videowhisper
Videowhisper picture Gallery |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:videowhisper:picture_gallery:1.4.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Videowhisper
Videowhisper picture Gallery |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:52:12.438Z
Reserved: 2026-02-01T11:24:18.719Z
Link: CVE-2021-47951
No data.
Status : Received
Published: 2026-05-10T13:16:31.720
Modified: 2026-05-10T13:16:31.720
Link: CVE-2021-47951
No data.
OpenCVE Enrichment
No data.
Weaknesses