The CP Image Store with Slideshow WordPress plugin before 1.0.68 does not sanitise and escape the ordering_by query parameter before using it in a SQL statement in pages where the [codepeople-image-store] is embed, allowing unauthenticated users to perform an SQL injection attack
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/cp-image-store_1-0-67 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-06-06T08:51:29
Updated: 2022-06-06T08:51:29
Reserved: 2022-05-12T00:00:00
Link: CVE-2022-1692
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-08T10:15:10.620
Modified: 2022-06-15T19:24:29.013
Link: CVE-2022-1692
JSON object: View
Redhat Information
No data.
CWE