Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-24915 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in WordPress 'Contest Gallery' plugin. πŸ“‰ **Consequences**: Attackers can steal user lists (usernames & emails) and execute arbitrary SQL commands.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: Improper Neutralization of Special Elements used in an SQL Command. πŸ› **Flaw**: The plugin fails to sanitize/escape the `cg-search-user-name-original` parameter before using it in SQL queries.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Contest Gallery – Photo Contest Plugin for WordPress. πŸ“… **Affected Versions**: Pre-13.1.0.6. 🌐 **Platform**: WordPress sites running PHP/MySQL.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: Unauthenticated access required! πŸ“§ **Data**: Extracts ALL registered users' usernames and email addresses. πŸ’» **Action**: Full SQL injection execution possible.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🚫 **Auth**: No authentication needed (Unauthenticated). βš™οΈ **Config**: Exploits the 'export users from gallery' feature. 🎯 **Ease**: Direct parameter manipulation via `cg-search-user-name-original`.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **PoC**: Yes, available via Nuclei templates (ProjectDiscovery). πŸ” **Detection**: Public YAML templates exist for automated scanning. 🌍 **Wild Exploit**: Likely widespread due to low barrier to entry and public PoCs.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for 'Contest Gallery' plugin version < 13.1.0.6. πŸ§ͺ **Test**: Use Nuclei template `CVE-2021-24915.yaml`. πŸ“‘ **Indicator**: Look for SQL errors or unexpected data in user export endpoints.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ”„ **Patch**: Upgrade Contest Gallery plugin to version **13.1.0.6** or later. πŸ› οΈ **Vendor Action**: WordPress Foundation/Plugin developer released the fix.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable the 'Contest Gallery' plugin immediately if patching isn't possible. 🚫 **Block**: Restrict access to the plugin's export endpoints via WAF or firewall rules.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. πŸ“’ **Reason**: Unauthenticated SQLi is critical. πŸ“§ **Risk**: Massive PII leak (emails/usernames). ⏱️ **Urgency**: Patch immediately to prevent data exfiltration and potential further exploitation.