The Five Minute Webshop WordPress plugin through 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-06-08 10:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-1686
Mitre link : CVE-2022-1686
CVE.ORG link : CVE-2022-1686
JSON object : View
Products Affected
five_minute_webshop_project
- five_minute_webshop
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')