CVE-2023-2482

The Responsive CSS EDITOR WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpwox:responsive_css_editor:*:*:*:*:*:wordpress:*:*

History

03 Jul 2023, 20:07

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
References (MISC) https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5 - (MISC) https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5 - Exploit, Third Party Advisory
First Time Wpwox
Wpwox responsive Css Editor
CPE cpe:2.3:a:wpwox:responsive_css_editor:*:*:*:*:*:wordpress:*:*

27 Jun 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-27 14:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-2482

Mitre link : CVE-2023-2482

CVE.ORG link : CVE-2023-2482


JSON object : View

Products Affected

wpwox

  • responsive_css_editor
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')