|
|||
Rule General Information |
---|
Release Date: | 2022-05-24 | |
Rule Name: | WordPress Photo Gallery Plugin filter_tag SQL Injection Vulnerability (CVE-2022-1281) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST['filter_tag'] parameter, which is appended to an SQL query, making SQL Injection attacks possible. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Others | |
Reference: | https://plugins.trac.wordpress.org/changeset/2706797/photo-gallery/trunk/frontend/models/BWGModelGalleryBox.php?old=2587758&old_path=photo-gallery%2Ftrunk%2Ffrontend%2Fmodels%2FBWGModelGalleryBox.php https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de |