CVE-2023-6620

The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 - Exploit, Third Party Advisory

19 Jan 2024, 18:30

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 - () https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 - Exploit, Third Party Advisory
First Time Wpexperts
Wpexperts post Smtp Mailer
CPE cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE CWE-89

15 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 16:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6620

Mitre link : CVE-2023-6620

CVE.ORG link : CVE-2023-6620


JSON object : View

Products Affected

wpexperts

  • post_smtp_mailer
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')