<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-8912 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-8912/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 13:17:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-8912/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contest Gallery WordPress Plugin SQL Injection Vulnerability (CVE-2026-8912)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8912-sqli/</link><pubDate>Tue, 19 May 2026 13:17:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-8912-sqli/</guid><description>The Contest Gallery plugin for WordPress is vulnerable to SQL Injection via the 'form_input' parameter in versions up to 28.1.6, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Contest Gallery plugin for WordPress is susceptible to SQL Injection attacks due to insufficient input sanitization of the &lsquo;form_input&rsquo; parameter. This vulnerability affects versions up to and including 28.1.6. The flaw resides within the &lsquo;post_cg_gallery_form_upload&rsquo; AJAX action, specifically in the &lsquo;cb&rsquo; branch of the included users-upload-check.php file. The &lsquo;$f_input_id&rsquo; variable is concatenated without proper quoting into a SQL query (&lsquo;SELECT Field_Content FROM &hellip; WHERE id = $f_input_id&rsquo;), creating an injection point. The only protection is a public frontend nonce (&lsquo;cg1l_action&rsquo; / &lsquo;cg_nonce&rsquo;) exposed in the page source, which an attacker can easily obtain, bypass and then inject arbitrary SQL queries to extract database information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target WordPress site using Contest Gallery plugin version &lt;= 28.1.6.</li>
<li>Attacker retrieves the &lsquo;cg1l_action&rsquo; / &lsquo;cg_nonce&rsquo; value from the HTML source of a public gallery page on the target site.</li>
<li>Attacker crafts a malicious HTTP POST request to the &lsquo;wp-admin/admin-ajax.php&rsquo; endpoint, targeting the &lsquo;post_cg_gallery_form_upload&rsquo; action.</li>
<li>The request includes the &lsquo;action&rsquo; parameter set to &lsquo;post_cg_gallery_form_upload&rsquo; and the &lsquo;form_input&rsquo; parameter containing a SQL injection payload.</li>
<li>The server executes the crafted SQL query, which includes the attacker&rsquo;s injected SQL code, without proper sanitization.</li>
<li>The attacker leverages the SQL injection to extract sensitive data, such as user credentials, configuration details, or other confidential information from the WordPress database.</li>
<li>The extracted data is returned to the attacker in the HTTP response.</li>
<li>Attacker uses the extracted information for further malicious activities, such as unauthorized access, data exfiltration, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-8912) allows unauthenticated attackers to directly query the WordPress database. This can lead to the exposure of sensitive data, including user credentials, API keys, and other confidential information stored in the database. The impact can range from data breaches and unauthorized access to complete compromise of the WordPress site and its associated data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available updates for the Contest Gallery plugin for WordPress to version greater than 28.1.6 to patch CVE-2026-8912.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-8912 Exploitation — WordPress Contest Gallery SQLi</code> to detect exploitation attempts based on specific URI patterns.</li>
<li>Monitor web server logs for suspicious POST requests to &lsquo;wp-admin/admin-ajax.php&rsquo; with SQL injection attempts in the &lsquo;form_input&rsquo; parameter as covered by the <code>Detect CVE-2026-8912 Exploitation — WordPress Contest Gallery SQLi</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql injection</category><category>cve-2026-8912</category><category>wordpress</category><category>plugin vulnerability</category></item></channel></rss>