Impact
The Contest Gallery plugin for WordPress is vulnerable to SQL injection through the 'form_input' parameter in versions up to 28.1.6. The vulnerability exists because the plugin concatenates the user-supplied value directly into an SQL query inside the unauthenticated 'post_cg_gallery_form_upload' AJAX action, allowing attackers to inject arbitrary SQL. This flaw can lead to extraction of sensitive database contents by unauthenticated users with access to any public gallery page.
Affected Systems
All installations of Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe up to and including version 28.1.6 are affected.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity risk. EPSS is not available, so the likelihood of exploitation cannot be quantified but the public exposure of the nonce on gallery pages removes authentication barriers, making the attack vector straightforward. The vulnerability is not listed in the CISA KEV catalog. Attackers can craft a malicious 'form_input' value in a request to the 'post_cg_gallery_form_upload' AJAX endpoint, which is reachable through any public gallery page, enabling them to run arbitrary SQL and read or modify database data.
OpenCVE Enrichment