The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2023-06-27T13:17:12.040Z
Updated: 2023-06-27T13:17:12.040Z
Reserved: 2023-05-09T15:12:13.644Z
Link: CVE-2023-2601
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-27T14:15:10.847
Modified: 2023-11-07T04:12:56.503
Link: CVE-2023-2601
JSON object: View
Redhat Information
No data.
CWE
No CWE.