The WP Video Gallery WordPress plugin through 1.7.1 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-05-09 17:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0826
Mitre link : CVE-2022-0826
CVE.ORG link : CVE-2022-0826
JSON object : View
Products Affected
wp-video-gallery-free_project
- wp-video-gallery-free
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')