The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 04:12
Type | Values Removed | Values Added |
---|---|---|
CWE |
27 Jun 2023, 09:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:querywall_plug\'n_play_firewall_project:querywall_plug\'n_play_firewall:*:*:*:*:*:wordpress:*:* | |
First Time |
Querywall Plug\'n Play Firewall Project querywall Plug\'n Play Firewall
Querywall Plug\'n Play Firewall Project |
|
References | (MISC) https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
19 Jun 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-19 11:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-2492
Mitre link : CVE-2023-2492
CVE.ORG link : CVE-2023-2492
JSON object : View
Products Affected
querywall_plug\'n_play_firewall_project
- querywall_plug\'n_play_firewall
CWE
No CWE.