First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4155 is a vulnerability in the Contest Gallery and Contest Gallery Pro WordPress plugins that allows malicious users with administrator privileges to execute arbitrary SQL queries.
CVE-2022-4155 has a severity rating of medium with a score of 4.9.
CVE-2022-4155 affects the Contest Gallery and Contest Gallery Pro WordPress plugins before version 19.1.5.1.
Yes, the vulnerability can be fixed by updating to Contest Gallery and Contest Gallery Pro WordPress plugins version 19.1.5.1 or later.
You can find more information about CVE-2022-4155 at the following references: [https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6) and [https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d](https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d).