CVE-2026-9059
Description
NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the 'orderby' parameter on the REST API endpoints '/imagely/v1/galleries' and '/imagely/v1/albums'.
The root cause is an insufficient sanitization function ('_clean_column()') in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with the 'NextGEN Gallery overview' capability (assigned to the Administrator role by default) to inject arbitrary SQL into the 'ORDER BY' clause.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated SQL injection in NextGEN Gallery <4.2.1 via the 'orderby' REST API parameter allows admin-level users to execute arbitrary SQL in ORDER BY clause.
Vulnerability
NextGEN Gallery versions prior to 4.2.1 are vulnerable to authenticated SQL injection via the orderby parameter on the REST API endpoints /imagely/v1/galleries and /imagely/v1/albums. The root cause is an insufficient sanitization function _clean_column() in the data mapper layer that uses a character blacklist instead of a whitelist approach, allowing an attacker to inject arbitrary SQL into the ORDER BY clause [1].
Exploitation
An attacker must be authenticated with the 'NextGEN Gallery overview' capability, which is assigned to the Administrator role by default. The attacker sends a crafted request to the affected REST API endpoints with a malicious orderby parameter value that bypasses the blacklist-based filter. The injection occurs in the ORDER BY clause of the SQL query [1].
Impact
Successful exploitation allows the attacker to execute arbitrary SQL commands in the database context. This can lead to information disclosure of sensitive data, data modification, or complete compromise of the WordPress installation depending on database permissions [1].
Mitigation
Upgrade to NextGEN Gallery version 4.2.1 or later, which fixes the vulnerability. Tenable disclosed the issue on April 7, 2026, and the vendor released the patched version prior to the public advisory on May 19, 2026 [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <4.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.