Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-0169SQL Injection in Photo Gallery

CWE-89SQL Injection6 documents6 sources
Severity
9.8CRITICALNVD
EPSS
82.2%
top 0.79%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 14
Latest updateMar 15

Description

The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVD10web/photo_gallery< 1.6.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3hxm-xw7j-7rgj: The Photo Gallery by 10Web WordPress plugin before 12022-03-15
CVEList
Photo Gallery by 10Web < 1.6.0 - Unauthenticated SQL Injection2022-03-14
VulnCheck
10web photo_gallery Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')2022

💥Exploits & PoCs

2
Nuclei
Photo Gallery by 10Web < 1.6.0 - SQL Injection
Metasploit
WordPress Photo Gallery Plugin SQL Injection (CVE-2022-0169)
CVE-2022-0169 — SQL Injection in 10web Photo Gallery | cvebase