First published: Mon Sep 22 2014(Updated: )
SQL injection vulnerability in the editgallery function in admin/gallery_func.php in the Huge-IT Image Gallery plugin 1.0.1 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the removeslide parameter to wp-admin/admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Huge-it Image Gallery | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7153 has a medium severity score due to its SQL injection vulnerability that can be exploited by authenticated users.
To fix CVE-2014-7153, upgrade the Huge-IT Image Gallery plugin to a version higher than 1.0.1.
CVE-2014-7153 affects users of the Huge-IT Image Gallery plugin version 1.0.1 for WordPress.
Exploiting CVE-2014-7153 could allow an attacker to execute arbitrary SQL commands on the affected WordPress site.
Yes, authentication is required for an attacker to exploit CVE-2014-7153 and execute the SQL injection.