The Slideshow Gallery LITE plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter in all versions up to, and including, 1.8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Tribulant
Tribulant slideshow Gallery Lite
CPEs cpe:2.3:a:tribulant:slideshow_gallery_lite:*:*:*:*:*:*:*:*
Vendors & Products Tribulant
Tribulant slideshow Gallery Lite
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-06-12T01:55:22.853Z

Updated: 2024-08-01T21:18:06.404Z

Reserved: 2024-05-30T18:24:11.640Z

Link: CVE-2024-5543

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.404Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-12T02:15:10.703

Modified: 2024-11-21T09:47:53.697

Link: CVE-2024-5543

cve-icon Redhat

No data.