Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & S…

Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & S…

by | Mar 2, 2026 | Plugins

Attack Vectors

The WordPress plugin Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe (slug: contest-gallery) is affected by CVE-2026-3180, a High severity vulnerability (CVSS 7.5, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

This issue is an unauthenticated blind SQL Injection, meaning an attacker does not need a valid account and does not need a victim to click anything. It can be triggered remotely over the internet by sending crafted requests that target the plugin’s password-recovery related inputs, specifically the cgLostPasswordEmail and cgl_mail parameters in versions up to and including 28.1.4.

Because the attack is “blind,” the attacker may not see database contents directly in the response. However, they can still infer and extract information over multiple requests, which is a common and proven approach used in real-world breaches.

Security Weakness

According to the published advisory, the plugin is vulnerable due to insufficient escaping of user-supplied input and a lack of sufficient preparation of an existing SQL query. In practical terms, this means attacker-controlled data can be appended to a database query in a way that the database interprets as commands rather than plain text.

This weakness enables SQL Injection—one of the most consistently exploited web application risks—because it can allow attackers to pull sensitive information from the WordPress database when defenses like robust input handling and properly prepared queries are not applied.

Official references: CVE-2026-3180 and the vendor/research details from Wordfence Threat Intelligence.

Technical or Business Impacts

The CVSS vector indicates high confidentiality impact (C:H), which aligns with the advisory’s warning that attackers can potentially extract sensitive information from the database. For business owners, executives, and compliance stakeholders, this can translate into:

Data exposure risk: Customer or user data stored in WordPress (including email addresses and other records your site holds) may be at risk of unauthorized disclosure, depending on what is stored and how the site is configured.

Regulatory and contractual exposure: If personal data is accessed, your organization may face notification obligations, audits, or contractual penalties depending on your industry and jurisdiction.

Brand and revenue impact: Even without visible site downtime, a confirmed data leak can erode trust, reduce conversion rates, and increase customer support costs—especially for brands running contests, community campaigns, or ecommerce-adjacent promotions.

Incident response and recovery costs: Investigation, log review, legal support, PR response, and remediation work frequently cost more than the technical patching effort—particularly when the exploit is unauthenticated and easy to automate.

Remediation: Update Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe to version 28.1.5 or newer (patched). If your organization uses this plugin as part of a marketing funnel or campaign microsite, prioritize the update to reduce exposure.

Similar Attacks

SQL Injection has a long history of being used to access sensitive data and trigger major incidents. While the root cause and affected products differ, these well-documented cases illustrate the business consequences of database injection weaknesses:

TalkTalk hack (2015) – widely reported as involving SQL injection

FTC settlement with Twitter (2010) – followed a breach that included an SQL injection vector (among other issues)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers