The Five Minute Webshop WordPress plugin through 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-06-06T08:51:20
Updated: 2022-06-06T08:51:20
Reserved: 2022-05-12T00:00:00
Link: CVE-2022-1686
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-08T10:15:10.283
Modified: 2022-06-15T17:39:11.247
Link: CVE-2022-1686
JSON object: View
Redhat Information
No data.
CWE