First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-4156.
The affected software is the Contest Gallery WordPress plugin before version 19.1.5.1 and the Contest Gallery Pro WordPress plugin before version 19.1.5.1.
This vulnerability has a severity rating of 7.5 (High).
This vulnerability can be exploited by malicious users with at least author privilege to leak sensitive information.
Yes, you can find more information about this vulnerability at the following references: [https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1) and [https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0](https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0).