CVE-2022-0479

The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link
Configurations

Configuration 1 (hide)

cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:38

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2686454 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2686454 - Patch, Third Party Advisory
References () https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816 - Exploit, Third Party Advisory

Information

Published : 2022-03-28 18:15

Updated : 2024-11-21 06:38


NVD link : CVE-2022-0479

Mitre link : CVE-2022-0479

CVE.ORG link : CVE-2022-0479


JSON object : View

Products Affected

sygnoos

  • popup_builder
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')