{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0765","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-02-09T16:53:54.532Z","datePublished":"2023-04-17T12:17:39.159Z","dateUpdated":"2025-03-05T18:54:54.186Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-04-17T12:17:39.159Z"},"title":"Gallery by BestWebSoft < 4.7.0 - Author+ SQL Injection","problemTypes":[{"descriptions":[{"description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Gallery by BestWebSoft","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"4.7.0"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not properly escape values used in SQL queries, leading to an Blind SQL Injection vulnerability. The attacker must have at least the privileges of an Author, and the vendor's Slider plugin (https://wordpress.org/plugins/slider-bws/) must also be installed for this vulnerability to be exploitable."}],"references":[{"url":"https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"dc11","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:24:34.125Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-05T18:54:35.579760Z","id":"CVE-2023-0765","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-05T18:54:54.186Z"}}]}}