CVE-2021-47951

medium

Description

WordPress Picture Gallery 1.4.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the Edit Content URL field in the Access Control settings. Attackers can enter JavaScript payloads in the plugin options that are stored in the database and executed when the functionality is triggered, enabling session hijacking or credential theft.

References

https://www.vulncheck.com/advisories/wordpress-picture-gallery-stored-xss-via-edit-content-url

https://www.exploit-db.com/exploits/50187

https://wordpress.org/plugins/picture-gallery/

Details

Source: Mitre, NVD

Published: 2026-05-10

Updated: 2026-05-10

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Severity: Medium