CVE-2026-3180
Published: 02 March 2026
Summary
CVE-2026-3180 is a high-severity SQL Injection (CWE-89) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Blind SQL injection in unauthenticated public-facing WordPress plugin directly enables remote exploitation of the web application for database data extraction.
NVD Description
The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1.4 due to…
more
insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The vulnerability's ’cgLostPasswordEmail’ parameter was patched in version 28.1.4, and the ’cgl_mail’ parameter was patched in version 28.1.5.
Deeper analysisAI
CVE-2026-3180 is a blind SQL injection vulnerability in the Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress, affecting all versions up to and including 28.1.4. The flaw arises from insufficient escaping of user-supplied parameters ‘cgLostPasswordEmail’ and ‘cgl_mail’, combined with inadequate preparation of existing SQL queries, allowing attackers to append additional SQL queries.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. Successful exploitation enables extraction of sensitive information from the database via blind SQL injection techniques. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), with impact primarily on confidentiality and mapped to CWE-89 (SQL Injection).
Mitigation involves updating to version 28.1.4 or later for the ‘cgLostPasswordEmail’ parameter fix, and version 28.1.5 or later for the ‘cgl_mail’ parameter patch. Code changes addressing the issues are visible in the plugin's Trac repository at referenced lines in files such as users-login-check-ajax-lost-password.php and cg-user-functions.php.
Details
- CWE(s)