The Comic Book Management System WordPress plugin before 2.2.0 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
References
Link | Resource |
---|---|
https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ | Broken Link |
https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-12-05T16:50:28.194Z
Updated:
Reserved: 2022-11-04T04:08:22.215Z
Link: CVE-2022-3856
JSON object: View
NVD Information
Status : Modified
Published: 2022-12-05T17:15:10.400
Modified: 2023-11-07T03:51:53.533
Link: CVE-2022-3856
JSON object: View
Redhat Information
No data.
CWE
No CWE.