First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-4159.
The severity level of CVE-2022-4159 is medium.
The Contest Gallery WordPress plugin before version 19.1.5.1 and the Contest Gallery Pro WordPress plugin before version 19.1.5.1 are affected by CVE-2022-4159.
An attacker with at least author privilege can exploit CVE-2022-4159 by manipulating the cg_id POST parameter to leak sensitive information.
Yes, you can check the following references to learn more about CVE-2022-4159: - [ISEE Bulletin](https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8) - [WPScan](https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965)