The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability.
References
Link | Resource |
---|---|
https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/ | Exploit |
https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d | Exploit Product Third Party Advisory |
Configurations
History
27 Nov 2023, 16:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dguzun article Analytics
Dguzun |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-89 | |
CPE | cpe:2.3:a:dguzun:article_analytics:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d - Exploit, Product, Third Party Advisory | |
References | () https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/ - Exploit |
20 Nov 2023, 19:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-20 19:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-5640
Mitre link : CVE-2023-5640
CVE.ORG link : CVE-2023-5640
JSON object : View
Products Affected
dguzun
- article_analytics
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')