The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of WordPress InPost Gallery: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of WordPress InPost Gallery, in order to run JavaScript code in the context of the web site.
Severity of this weakness: 2/4.
Creation date: 21/10/2016.
Références of this bulletin: VIGILANCE-VUL-20934.

Description of the vulnerability

The InPost Gallery plugin can be installed on WordPress.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of WordPress InPost Gallery, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

This computer vulnerability announce impacts software or systems such as WordPress Plugins ~ not comprehensive.

Our Vigil@nce team determined that the severity of this cybersecurity bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of document.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this threat alert.

Solutions for this threat

WordPress InPost Gallery: version 2.1.2.1.
The version 2.1.2.1 is fixed:
  https://fr.wordpress.org/plugins/inpost-gallery/
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides systems vulnerabilities analysis. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.