First published: Mon Dec 26 2022(Updated: )
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_multiple_files_for_post POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contest-gallery Contest Gallery | <19.1.5.1 | |
Contest-gallery Contest Gallery | <19.1.5.1 | |
<19.1.5.1 | ||
<19.1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Contest Gallery WordPress plugin is CVE-2022-4164.
The severity of CVE-2022-4164 is medium, with a severity value of 6.5.
The Contest Gallery WordPress plugin versions up to and excluding 19.1.5.1 and Contest Gallery Pro WordPress plugin versions up to and excluding 19.1.5.1 are affected by CVE-2022-4164.
CVE-2022-4164 allows malicious users with at least author privilege to perform SQL injection attacks, potentially leading to unauthorized information disclosure.
To fix the vulnerability in the Contest Gallery WordPress plugin, you should update to version 19.1.5.1 or later.