[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$flt2piQM2ZzJKeyXNbiQa6g1XuDgCQDVCpXRo4c8wvtc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-c906a988-ad45-49cc-9d77-6b501445ddc5-feed-instagram-lite","gallery-for-social-photo-subscriber-sql-injection","Gallery for Social Photo \u003C= 1.0.0.25 - Subscriber+ SQL Injection","The plugin Gallery for Social Photo is vulnerable to SQL Injection via the post parameter in the function gifeed_duplicate_feed in versions up to, and including 1.0.0.25 due to insufficient sanitization before using it in an unprepared SQL query. This make it possible for subscribers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","feed-instagram-lite",null,"\u003C=1.0.0.25","1.0.0.27","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2022-05-24 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc906a988-ad45-49cc-9d77-6b501445ddc5?source=api-prod",609]