The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
We have discovered 44,335 live websites that are affected by CVE-2024-29833.
Product | |
Category | Wordpress Plugins |
Vulnerable Domains | 44,335 live websites (42.24% of Photo Gallery by 10Web install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 329 versions ( 53.50% of all versions) |
![]() | 11,618 websites |
![]() | 5,520 websites |
![]() | 2,589 websites |
![]() | 2,345 websites |
![]() | 2,267 websites |
![]() | 1,606 websites |
![]() | 1,257 websites |
![]() | 1,236 websites |
![]() | 984 websites |
![]() | 780 websites |
.com | 15,881 websites |
.de | 2,904 websites |
.org | 2,288 websites |
.ru | 1,881 websites |
.pl | 1,835 websites |
.nl | 1,154 websites |
.co.uk | 1,034 websites |
.it | 1,012 websites |
.net | 924 websites |
.fr | 880 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
*********.kz | ![]() | **,*** | |
******.name | ![]() | **,*** | |
**********.**.uk | ![]() | **,*** | |
********.cz | ![]() | **,*** | |
***.***.ph | ![]() | **,*** | |
***.org | ![]() | **,*** | |
******************.org | ![]() | **,*** | |
****.***.pl | ![]() | ***,*** | |
**********.com | ![]() | ***,*** | |
*****.edu | ![]() | ***,*** |
FAQ