Description
WordPress Plugin Tidio Gallery is prone to a cross-site scripting vulnerability and an arbitrary file upload vulnerability. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials or launch other attacks, or to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. WordPress Plugin Tidio Gallery version 1.1 is vulnerable; other versions may also be affected.
Remediation
Disable the plugin until a fix is available
References
http://www.homelab.it/index.php/2014/07/15/wordpress-tidio-gallery-1-1-vulnerabilities/
http://www.intelligentexploit.com/view-details.html?id=19463
http://packetstormsecurity.com/files/127459/WordPress-Tidio-Gallery-1.1-Shell-Upload-XSS.html
Related Vulnerabilities
WordPress Plugin Analyticator Multiple Cross-Site Scripting Vulnerabilities (6.4.9.5)
WordPress Plugin WooCommerce Upload Files Arbitrary File Upload (59.3)
WordPress Plugin Comment and Review Spam Control for WooCommerce Security Bypass (1.4.2)
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-2402)