The The InPost Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution via the inpost_gallery_get_shortcode_template AJAX action in all versions up to, and including, 2.1.4.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
References
Configurations
History
09 Jul 2025, 18:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/inpost-gallery/trunk/index.php#L323 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3192113/ - Patch | |
References | () https://wordpress.org/plugins/inpost-gallery/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/5fbb2dcf-38b8-4ef1-bfea-bf5872cc7e37?source=cve - Third Party Advisory | |
First Time |
Pluginus
Pluginus inpost Gallery |
26 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-26 07:15
Updated : 2025-07-09 18:47
NVD link : CVE-2024-11002
Mitre link : CVE-2024-11002
CVE.ORG link : CVE-2024-11002
JSON object : View
Products Affected
pluginus
- inpost_gallery
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')