NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the 'orderby' parameter on the REST API endpoints '/imagely/v1/galleries' and '/imagely/v1/albums'.
The root cause is an insufficient sanitization function ('_clean_column()') in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with the 'NextGEN Gallery overview' capability (assigned to the Administrator role by default) to inject arbitrary SQL into the 'ORDER BY' clause.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2026-42 |
|
History
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Awesomemotive
Awesomemotive nextgen Gallery Wordpress Wordpress wordpress |
|
| Vendors & Products |
Awesomemotive
Awesomemotive nextgen Gallery Wordpress Wordpress wordpress |
Wed, 20 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the 'orderby' parameter on the REST API endpoints '/imagely/v1/galleries' and '/imagely/v1/albums'. The root cause is an insufficient sanitization function ('_clean_column()') in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with the 'NextGEN Gallery overview' capability (assigned to the Administrator role by default) to inject arbitrary SQL into the 'ORDER BY' clause. | |
| Title | NextGEN Gallery - SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-05-20T07:59:31.182Z
Reserved: 2026-05-20T06:51:03.927Z
Link: CVE-2026-9059
No data.
Status : Received
Published: 2026-05-20T09:16:27.020
Modified: 2026-05-20T09:16:27.020
Link: CVE-2026-9059
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:37:51Z