Description
The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' parameter in all versions up to, and including, 0.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-02-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Update
AI Analysis

Impact

The vulnerability is a SQL injection that can be triggered by supplying a crafted value to the 'postid' query parameter. An unauthenticated attacker can insert arbitrary SQL statements into the existing query, allowing the disclosure of database contents, including sensitive user data and content. The weakness arises from insufficient input validation and escaping (CWE-89).

Affected Systems

The issue affects all installations of the PhotoStack Gallery plugin for WordPress with a version of 0.4.1 or earlier. The plugin is distributed through the WordPress plugin repository and is used by any WordPress site that has enabled PhotoStack Gallery.

Risk and Exploitability

The CVSS score of 7.5 indicates high risk, but the EPSS score is less than 1%, suggesting a low probability of current exploitation. The vulnerability is not listed in CISA's KEV catalog. The attack vector is external; an attacker only needs to craft a request to the plugin endpoint with a malicious 'postid' value. Because authentication is not required, any user could exploit it, potentially compromising confidential data.

Generated by OpenCVE AI on April 15, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PhotoStack Gallery to version 0.4.2 or later, which removes the vulnerable 'postid' parameter handling.
  • If an upgrade is not possible, apply a web application firewall rule that blocks or sanitizes the 'postid' query parameter to reject requests containing SQL metacharacters such as ';', '--', or '/*'.
  • As a temporary measure, disable the PhotoStack Gallery plugin or the endpoint that exposes the 'postid' parameter until a patch is applied.

Generated by OpenCVE AI on April 15, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Savitasoni
Savitasoni photostack Gallery
Wordpress
Wordpress wordpress
Vendors & Products Savitasoni
Savitasoni photostack Gallery
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' parameter in all versions up to, and including, 0.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title PhotoStack Gallery <= 0.4.1 - Unauthenticated SQL Injection via 'postid' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Savitasoni Photostack Gallery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:21.520Z

Reserved: 2026-02-05T20:41:53.181Z

Link: CVE-2026-2024

cve-icon Vulnrichment

Updated: 2026-02-18T20:36:13.874Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T07:16:13.020

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2024

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:30:10Z

Weaknesses