Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qx4-67q8-fwg5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Timeline Calendar WordPress plugin through 1.2 does not sanitise, validate or escape the edit GET parameter before using it in a SQL statement when editing events, leading to an authenticated SQL injection issue. Other SQL Injections are also present in the plugin

The Timeline Calendar WordPress plugin through 1.2 does not sanitise, validate or escape the edit GET parameter before using it in a SQL statement when editing events, leading to an authenticated SQL injection issue. Other SQL Injections are also present in the plugin

EPSS

Процентиль: 77%
0.01062
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

The Timeline Calendar WordPress plugin through 1.2 does not sanitise, validate or escape the edit GET parameter before using it in a SQL statement when editing events, leading to an authenticated SQL injection issue. Other SQL Injections are also present in the plugin

EPSS

Процентиль: 77%
0.01062
Низкий

Дефекты

CWE-89