CVE-2022-4154
MEDIUM
4,9
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0085
Percentile
0,7th
Updated
EPSS Score Trend (Last 90 Days)
Application
Contest Gallery by Contest-Gallery
Version Range Affected
To
19.1.5.1
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:pro:wordpress:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5
https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a
https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5
https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a