WordPress Plugin Vulnerabilities

Contest Gallery < 13.1.0.6 - Missing Access Controls to Unauthenticated SQL injection / Email Address Disclosure

Description

The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address

Proof of Concept

Affects Plugins

Fixed in 13.1.0.6

References

Classification

Type
ACCESS CONTROLS
CWE
CVSS

Miscellaneous

Original Researcher
Tyler Miller
Submitter
Tyler Miller
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-11-01 (about 4 years ago)
Added
2021-11-01 (about 4 years ago)
Last Updated
2022-04-13 (about 3 years ago)

Other