vendor:
WordPress Video Gallery
by:
Kacper Szurek
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WordPress Video Gallery
Affected Version From: 2.7
Affected Version To: 2.7
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:wordpress_video_gallery:2.7
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: WordPress
2015
WordPress Video Gallery 2.7 SQL Injection
$_GET['vid'] is not escaped in the WordPress Video Gallery 2.7 plugin. The google_adsense() function is accessible for everyone, which allows attackers to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can be done by sending a request to the admin-ajax.php file with the action parameter set to googleadsense and the vid parameter set to a malicious SQL statement.
Mitigation:
Update to the latest version of the WordPress Video Gallery 2.7 plugin.