First published: Mon Apr 15 2019(Updated: )
SQL Injection exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-galleries&method=save Gallery[id] or Gallery[title] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tribulant Slideshow Gallery | =1.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SQL injection vulnerability is CVE-2018-18018.
The Tribulant Slideshow Gallery plugin version 1.6.8 for WordPress is affected by this vulnerability.
The severity of this vulnerability is classified as critical with a CVSS score of 9.8.
The SQL injection occurs via the wp-admin/admin.php?page=slideshow-galleries&method=save Gallery[id] or Gallery[title] parameter.
Yes, references for this vulnerability can be found at the following links: [https://ansawaf.blogspot.com/2019/04/xss-and-sqli-in-slideshow-gallery.html](https://ansawaf.blogspot.com/2019/04/xss-and-sqli-in-slideshow-gallery.html) and [https://docs.google.com/document/d/1rwN4hJkD5TJfCa16rsGwzYhzL-ODd2VLkFnPvAIq4Ys/edit?usp=sharing](https://docs.google.com/document/d/1rwN4hJkD5TJfCa16rsGwzYhzL-ODd2VLkFnPvAIq4Ys/edit?usp=sharing).