The Five Minute Webshop WordPress plugin through 1.3.2 does not properly validate and sanitise the orderby parameter before using it in a SQL statement via the Manage Products admin page, leading to an SQL Injection
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-06-08 10:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-1685
Mitre link : CVE-2022-1685
CVE.ORG link : CVE-2022-1685
JSON object : View
Products Affected
five_minute_webshop_project
- five_minute_webshop
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')