Documentation: Home / Gallery Plugin for WordPress – Envira Photo Gallery
This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
Several plugins used on WordPress websites are at risk of a type of hacking called Stored Cross-Site Scripting. This happens because the plugins use a JavaScript library called FancyBox that is not p...
Read MoreThe Envira Photo Gallery plugin for WordPress has a security issue that allows unauthorized changes to be made to data. This is because the envira_gallery_ajax_load_gallery_data() function does not h...
Read MoreThe Envira Photo Gallery plugin for WordPress, known as the Gallery Plugin, has a security issue that allows hackers to inject harmful code through the gallery image title field. This can only be don...
Read MoreThe Envira Photo Gallery plugin for WordPress is not secure in versions up to and including 1.8.7.3. This is because it does not properly check for a special code when performing certain actions. Thi...
Read MoreThe Envira Photo Gallery plugin for WordPress is vulnerable to unauthorized changes to data. This means that anyone with access to the plugin, at a contributor level or higher, can make changes to ot...
Read MoreThe Envira Photo Gallery plugin for WordPress is not secure in versions up to 1.8.4.6. This means that an unauthenticated person can inject malicious code into a page if they can get a user to click a...
Read MoreThe Envira Gallery Lite WordPress plugin
Read More© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)