WordPress Gallery Plugin – NextGEN Gallery

Information

Software Type Plugin
Software Slug nextgen-gallery (view on wordpress.org)
Software Status Active
Software Author smub
Software Website www.imagely.com
Software Downloads 40,333,077
Software Active Installs 500,000
Software Record Last Updated April 27, 2024

Showing 21-30 of 30 Vulnerabilities

Title CVE ID CVSS Researchers Date
NextGen Gallery <= 2.1.10 - Local File Inclusion CVE-2015-9538 6.5 Sathish Kumar August 28, 2015
WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Arbitrary File Upload CVE-2015-1785 8.8 Louie Augarde March 25, 2015
WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Cross-Site Request Forgery CVE-2015-1784 8.8 Louie Augarde March 25, 2015
NextGen Gallery <= 2.0.65 - Arbitrary File Upload 8.8 SANTHO May 20, 2014
NextGen Gallery <= 2.0 - Path Traversal 7.5 Mallory Adams February 18, 2014
WordPress Gallery Plugin – NextGEN Gallery <= 1.9.12 - Arbitrary File Upload CVE-2013-3684 9.8 Marcos Agüero June 13, 2013
WordPress Gallery Plugin – NextGEN Gallery 1.9.10 - 1.9.11 - Full Path Disclosure CVE-2013-0291 7.5 Henrique Montenegro February 14, 2013
SWFUpload <= 2.2.0.1 - Cross-Site Scripting CVE-2012-3414 6.1 Neal Poole, Nathan Partlan November 9, 2012
NextGen Gallery <= 1.9.7 - Cross-Site Scripting CVE-2012-3414 6.1 June 14, 2012
WordPress Gallery Plugin – NextGEN Gallery <= 1.5.1 - Cross-Site Scripting CVE-2010-1186 6.1 Core Security Technologies April 6, 2010

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation