First published: Sun May 28 2023(Updated: )
A vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The identifier of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Portfolio Gallery | <1.1.9 |
https://github.com/wp-plugins/portfolio-gallery/commit/58ed88243e17df766036f4857041edaf358076d3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-125101 is classified as a critical vulnerability.
CVE-2014-125101 affects the Portfolio Gallery Plugin versions up to 1.1.8.
CVE-2014-125101 leads to SQL injection, allowing remote attackers to manipulate the database.
To fix CVE-2014-125101, upgrade the Portfolio Gallery Plugin to version 1.1.9 or higher.
Yes, CVE-2014-125101 can be exploited remotely, making it a significant risk to WordPress installations using the affected plugin.