CVE-2026-9059 PUBLISHED

NextGEN Gallery - SQL Injection

Assigner: tenable
Reserved: 20.05.2026 Published: 20.05.2026 Updated: 20.05.2026

NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the 'orderby' parameter on the REST API endpoints '/imagely/v1/galleries' and '/imagely/v1/albums'.

The root cause is an insufficient sanitization function ('_clean_column()') in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with the 'NextGEN Gallery overview' capability (assigned to the Administrator role by default) to inject arbitrary SQL into the 'ORDER BY' clause.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H
CVSS Score: 9.3

Product Status

Vendor awesomemotive
Product NextGEN Gallery
Versions Default: unaffected
  • affected from O to 4.2.1 (excl.)

References

Problem Types

  • CWE-89 Improper neutralization of special elements used in an SQL command ('SQL injection') CWE