Description
Kepler Wallpaper Script 1.1 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the category parameter. Attackers can send GET requests to the category endpoint with URL-encoded SQL UNION statements to extract database information including usernames, database names, and MySQL version details.
Published: 2026-03-21
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Disclosure
Action: Immediate Patch
AI Analysis

Impact

Kepler Wallpaper Script version 1.1 contains a SQL injection flaw in the category parameter, allowing an attacker to inject arbitrary SQL through GET requests. The vulnerability enables extraction of usernames, database names, and MySQL version information, exposing sensitive data and potentially serving as a foothold for further attacks. It corresponds to CWE-89.

Affected Systems

Any deployment of Kepler Wallpapers Script 1.1, the standalone PHP application provided by Keplerwallpapers, is affected. The script is commonly used as a component in web sites that offer wallpaper services.

Risk and Exploitability

The CVSS base score of 8.8 indicates high severity. No EPSS score is available and the vulnerability is not listed in the KEV catalog, so the exploitation likelihood is uncertain but not negligible. The flaw can be triggered by unauthenticated users via a direct HTTP GET request to the category endpoint, making exploitation relatively straightforward for an exposed instance.

Generated by OpenCVE AI on March 21, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the installed version of Kepler Wallpaper Script. If it is 1.1, plan an upgrade to a patched version or apply the vendor’s official fix if available.
  • If an upgrade is not possible, restrict access to the vulnerable endpoint using firewall rules or .htaccess directives so that only authenticated users can reach it.
  • Modify the script to validate the ‘category’ parameter against a whitelist of authorized values or to use parameterized queries, thereby eliminating user input from the SQL statement.
  • Monitor web logs for anomalous requests containing UNION SELECT or other SQL keywords and block offending IP addresses.
  • Consider additional logging and alerting to detect potential exploitation attempts.

Generated by OpenCVE AI on March 21, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:keplerwallpapers:kepler_wallpaper_script:1.1:*:*:*:*:*:*:*

Wed, 25 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Keplerwallpapers
Keplerwallpapers kepler Wallpaper Script
Vendors & Products Keplerwallpapers
Keplerwallpapers kepler Wallpaper Script

Sat, 21 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description Kepler Wallpaper Script 1.1 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the category parameter. Attackers can send GET requests to the category endpoint with URL-encoded SQL UNION statements to extract database information including usernames, database names, and MySQL version details.
Title Kepler Wallpaper Script 1.1 SQL Injection via category
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Keplerwallpapers Kepler Wallpaper Script
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T15:15:12.492Z

Reserved: 2026-03-21T15:24:10.532Z

Link: CVE-2019-25576

cve-icon Vulnrichment

Updated: 2026-03-24T14:09:32.560Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T16:16:01.333

Modified: 2026-04-15T17:07:44.273

Link: CVE-2019-25576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:07Z

Weaknesses