Description
XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to cat.php with malicious cat_id values to bypass authentication, extract sensitive data, or modify database contents.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Data Manipulation and Disclosure
Action: Immediate Patch
AI Analysis

Impact

The XooGallery Latest application contains an SQL injection flaw in the cat.php entry point that operates via the cat_id parameter. Unauthenticated attackers can manipulate database queries by sending a malicious cat_id in a GET request, causing the database to return or alter sensitive information. The weakness maps to CWE‑89, representing unvalidated input concatenated directly into SQL statements.

Affected Systems

The vulnerability affects the Xooscripts XooGallery product, specifically the current release known as XooGallery Latest. Exact version numbers that contain the flaw are not listed; therefore any installation of the current release prior to a fixed patch is potentially exposed.

Risk and Exploitability

With a CVSS base score of 8.8 the flaw is classified as High severity. The EPSS score is below 1%, indicating the exploitation likelihood is considered low at this time, and it is not catalogued in the CISA KEV list. Attackers would need only a simple HTTP GET request containing a malicious cat_id value to exploit the issue. Because the injection occurs before authentication checks, an attacker can read or modify catalog data, potentially compromising sensitive information, but the impact does not include elevation of privileges beyond what the application already allows.

Generated by OpenCVE AI on March 23, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s security update to XooGallery Latest so that the cat_id input is properly validated or parameterized.
  • If a patch is unavailable, restrict unauthenticated access to cat.php or enforce authentication before the cat_id parameter is processed.
  • Configure a web‑application firewall to block suspicious cat_id payloads or patterns that indicate SQL injection attempts.
  • Verify your installation contains the patched code by reviewing the cat.php source or checking the vendor’s release notes.
  • Monitor HTTP requests to cat.php for anomalous activity and audit database logs for unauthorized queries.

Generated by OpenCVE AI on March 23, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xooscripts:xoogallery:-:*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Xooscripts
Xooscripts xoogallery
Vendors & Products Xooscripts
Xooscripts xoogallery

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to cat.php with malicious cat_id values to bypass authentication, extract sensitive data, or modify database contents.
Title XooGallery Lastest Latest SQL Injection via cat.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Xooscripts Xoogallery
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-12T16:43:08.366Z

Reserved: 2026-03-12T13:55:34.125Z

Link: CVE-2019-25523

cve-icon Vulnrichment

Updated: 2026-03-12T16:42:28.952Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:05.517

Modified: 2026-03-23T13:42:45.267

Link: CVE-2019-25523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:39:50Z

Weaknesses