
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-41135) affects the Modula Image Gallery WordPress plugin versions 2.6.9 and below. Discovered and reported by Tien Nguyen Anh, this security flaw was publicly disclosed on October 28, 2022. The vulnerability is characterized as a Missing Authorization to Plugin Settings Change issue, which allows unauthenticated users to modify the plugin's troubleshooting settings (WPScan, Patchstack).
The vulnerability stems from the absence of proper authorization and CSRF (Cross-Site Request Forgery) checks when updating the plugin's troubleshooting settings. It is classified under OWASP Top 10 category A5: Broken Access Control and CWE-862. The vulnerability has received varying CVSS scores from different sources, ranging from 5.3 (medium) to 7.5 (high), indicating its significant security impact (WPScan, Wordfence).
The vulnerability allows any unauthenticated user to modify the plugin's troubleshooting settings, potentially leading to unauthorized changes in the plugin's configuration. This security flaw is considered highly dangerous and is expected to become mass exploited, as indicated by its high CVSS severity rating (Patchstack).
The vulnerability has been fixed in version 2.6.91 of the Modula Image Gallery plugin. Website administrators are strongly advised to update to this version or later to resolve the security issue. For users unable to update immediately, virtual patching solutions are available through security providers to mitigate potential attacks (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."