First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2022-4158.
The affected software is Contest Gallery WordPress plugin before 19.1.5.1 and Contest Gallery Pro WordPress plugin before 19.1.5.1.
The severity of CVE-2022-4158 is high with a value of 7.5.
This vulnerability can be exploited by malicious visitors leaking sensitive information.
Yes, the fix for this vulnerability is to update to Contest Gallery WordPress plugin version 19.1.5.1 or Contest Gallery Pro WordPress plugin version 19.1.5.1.