The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a | Exploit Patch Third Party Advisory |
https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-09-19 14:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2958
Mitre link : CVE-2022-2958
CVE.ORG link : CVE-2022-2958
JSON object : View
Products Affected
badgeos
- badgos
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')