CVE-2022-0169
CRITICAL EXPLOITED NUCLEIWordPress Photo Gallery Plugin SQL Injection (CVE-2022-0169)
Title source: metasploitDescription
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
Exploits (2)
metasploit
WORKING POC
by Krzysztof Zając, Valentin Lobstein, X3RX3S · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/wp_photo_gallery_sqli.rb
Nuclei Templates (1)
Photo Gallery by 10Web < 1.6.0 - SQL Injection
CRITICALVERIFIEDby ritikchaddha,princechaddha
Shodan:
http.html:/wp-content/plugins/photo-gallery
FOFA:
body=/wp-content/plugins/photo-gallery
Scores
CVSS v3
9.8
EPSS
0.8216
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-09-11
CWE
CWE-89
Status
published
Products (1)
10web/photo_gallery
< 1.6.0
Published
Mar 14, 2022
Tracked Since
Feb 18, 2026