The WPSmartContracts WordPress plugin before 1.3.12 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-11-28T13:47:07.347Z
Updated: 2022-12-02T11:10:55.823Z
Reserved: 2022-10-31T12:50:58.150Z
Link: CVE-2022-3768
JSON object: View
NVD Information
Status : Modified
Published: 2022-11-28T14:15:13.817
Modified: 2023-11-07T03:51:46.790
Link: CVE-2022-3768
JSON object: View
Redhat Information
No data.
CWE