PICA Photo Gallery <= 1.0 - SQL Injection
The PICA Photo Gallery plugin for WordPress is vulnerable to SQL Injection via the ‘aid’ parameter in versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
This vulnerability is a critical severity with CVSS 9.8 SQL Injection issue affecting the Plugin PICA Photo Gallery. It affects Versions up to 1.0 and is listed without a confirmed patched release.
the tracked vulnerability is tracked for the Plugin PICA Photo Gallery as critical severity with CVSS 9.8. The affected range is Versions up to 1.0. No fixed release is listed in this feed entry, so operators should monitor the vendor and reference links before accepting the risk.
| Software Type | Plugin |
|---|---|
| Software Slug |
pica-photo-gallery
View on wordpress.org
|
| CVE | No linked CVE entry. |
| Patched Versions |
No patched versions published.
|
| Affected Versions |
Versions up to 1.0
|
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more