
Cloud Vulnerability DB
A community-led vulnerabilities database
An authenticated SQL Injection (SQLi) vulnerability was discovered in the WordPress Contest Gallery plugin versions 17.0.4 and earlier. The vulnerability was identified on August 9, 2022, and was assigned CVE-2022-36394 (Patchstack).
The vulnerability has been assigned a CVSS score of 7.6 (High severity) and is classified as an SQL Injection vulnerability under the OWASP Top 10 category A1: Injection. The vulnerability requires author or higher privileges to exploit (Patchstack).
This vulnerability could allow an authenticated attacker with author or higher privileges to directly interact with the database, potentially leading to unauthorized access to sensitive information or manipulation of database contents (Patchstack).
The vulnerability was fixed in version 17.0.5 of the Contest Gallery plugin. Users are advised to update to version 17.0.5 or later to remediate this security issue (Patchstack, WordPress).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."