The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-09-19T00:00:00
Updated: 2022-10-07T00:00:00
Reserved: 2022-08-16T00:00:00
Link: CVE-2022-2840
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-19T14:15:11.000
Modified: 2022-12-03T02:40:56.700
Link: CVE-2022-2840
JSON object: View
Redhat Information
No data.
CWE