Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6xvw-4q6f-6756

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

EPSS

Процентиль: 72%
0.00703
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.8
nvd
около 4 лет назад

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

EPSS

Процентиль: 72%
0.00703
Низкий

Дефекты

CWE-89