Description
WordPress Plugin Really Simple Gallery is prone to multiple vulnerabilities, including arbitrary file upload and cross-site request forgery vulnerabilities. A successful exploit may allow an attacker to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation, or to perform certain administrative actions; other attacks are also possible. WordPress Plugin Really Simple Gallery version 1.4 is vulnerable; prior versions may also be affected.
Remediation
Disable the plugin until a fix is available
References
Related Vulnerabilities
PostgreSQL Improper Access Control Vulnerability (CVE-2019-10128)
WordPress Plugin BetterOptin Cross-Site Scripting (2.0.2)
WordPress Plugin WordPress Calls to Action Multiple Cross-Site Scripting Vulnerabilities (2.5.0)
Squid Out-of-bounds Write Vulnerability (CVE-2019-18676)
WordPress Plugin Premium Addons for Elementor Security Bypass (4.5.1)