First published: Sat Oct 19 2024(Updated: )
The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
I13websolution Photo Gallery Slideshow & Masonry Tiled Gallery | <1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25218 is classified as a high-severity SQL Injection vulnerability that allows attackers to execute arbitrary SQL commands.
To fix CVE-2019-25218, update the Photo Gallery Slideshow & Masonry Tiled Gallery plugin to version 1.0.4 or later.
CVE-2019-25218 affects all versions of the Photo Gallery Slideshow & Masonry Tiled Gallery plugin up to and including version 1.0.3.
Exploitation of CVE-2019-25218 could allow unauthorized access to your database, leading to data theft or manipulation.
Aside from updating the plugin, it is advisable to implement web application firewalls to help filter and block malicious SQL queries.