First published: Mon Mar 14 2022(Updated: )
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
10web Photo Gallery | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0169 is a vulnerability in the Photo Gallery by 10Web WordPress plugin before version 1.6.0.
The severity of CVE-2022-0169 is critical with a CVSS score of 9.8.
CVE-2022-0169 allows unauthenticated and authenticated users to perform SQL injection attacks through the bwg_tag_id_bwg_thumbnails_0 parameter.
To fix the CVE-2022-0169 vulnerability, update the Photo Gallery by 10Web WordPress plugin to version 1.6.0 or later.
Yes, you can find more information about CVE-2022-0169 at the following references: [Reference 1](https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9), [Reference 2](https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c).