Authentication Bypass Vulnerability in WP Easy Gallery
CVE-2024-9018
8.8HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 1 October 2024
Summary
The WP Easy Gallery Plugin for WordPress is prone to a time-based SQL Injection vulnerability triggered by the ‘key’ parameter. This issue, present in all versions up to and including 4.8.5, arises from inadequate escaping of user-supplied data and insufficient preparation of SQL statements. As a result, authenticated users with Contributor-level access or higher can manipulate existing SQL queries, potentially allowing attackers to extract sensitive information from the database, posing a serious risk to the integrity and confidentiality of stored data.
Affected Version(s)
WP Easy Gallery – WordPress Gallery Plugin * <= 4.8.5
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Peter Thaleikis