CVE-2022-3991
Photospace Gallery <= 2.3.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting
CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th
The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
| CWE | CWE-79 |
| Vendor | deanoakley |
| Product | photospace gallery |
| Published | Nov 29, 2022 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for deanoakley photospace gallery
Be the first to know when new medium vulnerabilities affecting deanoakley photospace gallery are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
deanoakley / Photospace Gallery
0 โค 2.3.5
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/51212d87-8723-4ba7-8fa4-78912a56385f?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/photospace/trunk/photospace.php#L87 wordfence.com: https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3991
Credits
Marco Wotschka