First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4157 is a vulnerability in the Contest Gallery WordPress plugin and Contest Gallery Pro WordPress plugin that allows malicious users with administrator privileges to execute arbitrary SQL queries.
Versions up to and excluding 19.1.5.1 of the Contest Gallery WordPress plugin and Contest Gallery Pro WordPress plugin are affected.
CVE-2022-4157 has a severity keyword of 'medium' and a severity value of 4.9.
The vulnerability can be exploited by malicious users with administrator privileges who can manipulate the 'cg_option_id' POST parameter to execute arbitrary SQL queries in the 'export-votes-all.php' file.
Yes, you can find more information on CVE-2022-4157 at the following references: [https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3) and [https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6](https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6).