CrowdSec
5/10CrowdSec Score

Photo Gallery by 10Web Mobile-Friendly Image Gallery - SQLi (CVE-2022-0169)

Published on14-03-2022
First seen on11-09-2025

192Exploiting IPs reported

The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection

CrowdSec analysis

CVE-2022-0169 is a critical SQL injection vulnerability in the Photo Gallery by 10Web WordPress plugin prior to version 1.6.0, allowing unauthenticated attackers to exploit the bwg_tag_id_bwg_thumbnails_0 parameter via AJAX requests. This flaw could enable remote attackers to execute arbitrary SQL commands, potentially leading to data theft, unauthorized access, or complete compromise of the affected WordPress site.

CrowdSec has been tracking this vulnerability and its exploits since 10th of September 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2022-0169 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. In addition, according to the CrowdSec network, attack volume against CVE-2022-0169 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit the /wp-admin/admin-ajax.php endpoint with the action=bwg_frontend_data parameter, injecting SQL payloads via the bwg_tag_id_bwg_thumbnails_0[] parameter to perform unauthenticated SQL injection attacks.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.