CVE-2022-3395

The WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.
Configurations

Configuration 1 (hide)

cpe:2.3:a:soflyy:wp_all_export:*:*:*:*:pro:wordpress:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 - Exploit, Third Party Advisory

Information

Published : 2022-10-25 17:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3395

Mitre link : CVE-2022-3395

CVE.ORG link : CVE-2022-3395


JSON object : View

Products Affected

soflyy

  • wp_all_export
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')