Vulnerability Description
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 10Web | Photo Gallery | < 1.6.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9PatchRelease NotesThird Party Advisory
- https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709cExploitThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2672822/photo-gallery#file9PatchRelease NotesThird Party Advisory
- https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709cExploitThird Party Advisory
FAQ
What is CVE-2022-0169?
CVE-2022-0169 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action...
How severe is CVE-2022-0169?
CVE-2022-0169 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0169?
Check the references section above for vendor advisories and patch information. Affected products include: 10Web Photo Gallery.