Photo Gallery by 10Web Mobile-Friendly Image Gallery - SQLi (CVE-2022-0169)
194Exploiting IPs reported
The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection
CrowdSec analysis
CVE-2022-0169 is a critical SQL injection vulnerability in the Photo Gallery by 10Web WordPress plugin prior to version 1.6.0, allowing unauthenticated attackers to exploit the bwg_tag_id_bwg_thumbnails_0 parameter via AJAX requests. This flaw could enable remote attackers to execute arbitrary SQL commands, potentially leading to data theft, unauthorized access, or complete compromise of the affected WordPress site.
CrowdSec has been tracking this vulnerability and its exploits since 10th of September 2025.
According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2022-0169 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2022-0169 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2022-0169 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.
Attackers exploit the /wp-admin/admin-ajax.php
endpoint with the action=bwg_frontend_data
parameter, injecting SQL payloads via the bwg_tag_id_bwg_thumbnails_0[]
parameter to perform unauthenticated SQL injection attacks.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.