Impact
The flaw in XooGallery allows unprivileged users to inject SQL code by manipulating the gal_id parameter in a URL. The injection is not sanitized and can be used to read confidential database entries or to alter or delete data. The weakness is a classic SQL Injection (CWE‑89).
Affected Systems
XooGallery, a content management system from Xooscripts, is affected. The vulnerability is documented for the generic product without specifying a particular version, indicating that recent public releases are at risk. Any installation that exposes gal.php to external traffic is susceptible.
Risk and Exploitability
The CVSS score of 8.8 places the vulnerability in the high severity range, showing that full data compromise is possible. The EPSS score of less than 1% suggests that exploitation is currently unlikely in the wild, and the vulnerability is not in the CISA KEV catalog. The attack vector is inferred to be network-based via HTTP GET requests, requiring no authentication.
OpenCVE Enrichment