CVE-2026-3180: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in contest-gallery Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe
The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The vulnerability's ’cgLostPasswordEmail’ parameter was patched in version 28.1.4, and the ’cgl_mail’ parameter was patched in version 28.1.5.
AI Analysis
Technical Summary
CVE-2026-3180 is a blind SQL Injection vulnerability classified under CWE-89, discovered in the WordPress plugin 'Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe'. The vulnerability arises from improper neutralization of special elements in SQL commands, specifically through the 'cgLostPasswordEmail' and 'cgl_mail' parameters. These parameters are insufficiently escaped and the SQL queries are not properly prepared, allowing unauthenticated attackers to append arbitrary SQL code. This can lead to unauthorized extraction of sensitive information from the backend database, such as user credentials or payment data. The vulnerability affects all plugin versions up to 28.1.4 for the 'cgLostPasswordEmail' parameter and up to 28.1.5 for the 'cgl_mail' parameter. The patches introduced in these versions address the issue by implementing proper input sanitization and prepared statements. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and high confidentiality impact. No integrity or availability impacts are noted. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on February 25, 2026, and published on March 2, 2026.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored in the WordPress site's database. This could include user personal information, authentication credentials, and payment transaction details processed via PayPal and Stripe integrations. As the plugin is used for uploading and voting on media, attackers could also gain insights into user activity and potentially leverage this information for further attacks such as phishing or account takeover. Since the vulnerability does not affect data integrity or availability, the risk is mainly confidentiality breach. However, the exposure of sensitive data can lead to reputational damage, regulatory penalties (e.g., GDPR violations), and financial losses for affected organizations. The ease of exploitation (no authentication or user interaction required) increases the threat level, especially for publicly accessible WordPress sites using this plugin. Organizations relying on this plugin for e-commerce or community engagement are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately update the 'Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe' plugin to version 28.1.5 or later, which contains patches for both vulnerable parameters. If immediate update is not possible, temporarily disabling the plugin or restricting access to affected parameters via web application firewall (WAF) rules can reduce exposure. Implementing strict input validation and employing prepared statements for all database queries in custom code is recommended to prevent similar vulnerabilities. Regularly auditing WordPress plugins for updates and vulnerabilities, and maintaining a robust patch management process, will help mitigate risks. Monitoring web server logs for suspicious SQL injection attempts targeting these parameters can provide early detection. Additionally, limiting database user permissions to only necessary operations can reduce the impact of potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-3180: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in contest-gallery Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe
Description
The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The vulnerability's ’cgLostPasswordEmail’ parameter was patched in version 28.1.4, and the ’cgl_mail’ parameter was patched in version 28.1.5.
AI-Powered Analysis
Technical Analysis
CVE-2026-3180 is a blind SQL Injection vulnerability classified under CWE-89, discovered in the WordPress plugin 'Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe'. The vulnerability arises from improper neutralization of special elements in SQL commands, specifically through the 'cgLostPasswordEmail' and 'cgl_mail' parameters. These parameters are insufficiently escaped and the SQL queries are not properly prepared, allowing unauthenticated attackers to append arbitrary SQL code. This can lead to unauthorized extraction of sensitive information from the backend database, such as user credentials or payment data. The vulnerability affects all plugin versions up to 28.1.4 for the 'cgLostPasswordEmail' parameter and up to 28.1.5 for the 'cgl_mail' parameter. The patches introduced in these versions address the issue by implementing proper input sanitization and prepared statements. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and high confidentiality impact. No integrity or availability impacts are noted. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on February 25, 2026, and published on March 2, 2026.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored in the WordPress site's database. This could include user personal information, authentication credentials, and payment transaction details processed via PayPal and Stripe integrations. As the plugin is used for uploading and voting on media, attackers could also gain insights into user activity and potentially leverage this information for further attacks such as phishing or account takeover. Since the vulnerability does not affect data integrity or availability, the risk is mainly confidentiality breach. However, the exposure of sensitive data can lead to reputational damage, regulatory penalties (e.g., GDPR violations), and financial losses for affected organizations. The ease of exploitation (no authentication or user interaction required) increases the threat level, especially for publicly accessible WordPress sites using this plugin. Organizations relying on this plugin for e-commerce or community engagement are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately update the 'Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe' plugin to version 28.1.5 or later, which contains patches for both vulnerable parameters. If immediate update is not possible, temporarily disabling the plugin or restricting access to affected parameters via web application firewall (WAF) rules can reduce exposure. Implementing strict input validation and employing prepared statements for all database queries in custom code is recommended to prevent similar vulnerabilities. Regularly auditing WordPress plugins for updates and vulnerabilities, and maintaining a robust patch management process, will help mitigate risks. Monitoring web server logs for suspicious SQL injection attempts targeting these parameters can provide early detection. Additionally, limiting database user permissions to only necessary operations can reduce the impact of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-25T05:48:17.651Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a5ccceb6c0d8506fb7921b
Added to database: 3/2/2026, 5:45:50 PM
Last enriched: 3/2/2026, 6:00:06 PM
Last updated: 3/2/2026, 11:04:46 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2583: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy
MediumCVE-2026-3338: CWE-347 (Improper Verification of Cryptographic Signature) in AWS AWS-LC
HighCVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC
MediumCVE-2026-3336: CWE-295 (Improper Certificate Validation) in AWS AWS-LC
HighCVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.