Impact
The Contest Gallery WordPress plugin allows unauthenticated attackers to append SQL queries through the cgLostPasswordEmail and cgl_mail parameters, resulting in a blind SQL injection vulnerability (CWE‑89). This flaw enables attackers to extract or modify database information without authentication, potentially compromising contestant data, financial records, or other sensitive content stored by the site.
Affected Systems
All installations of the Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress that use versions up to and including 28.1.4 are vulnerable. Version 28.1.4 includes a patch for the cgLostPasswordEmail parameter, while the cgl_mail parameter was fixed in version 28.1.5, so any active instance running a lower version is affected.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating high severity. EPSS shows a very low exploitation probability (< 1%), and it is not listed in the CISA KEV catalog. The attack vector is likely through normal web requests to the plugin’s password reset or login endpoints; an attacker need only supply crafted parameters in a URL or form, making it easy to exploit remotely without needing prior authentication.
OpenCVE Enrichment