Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7qqw-3436-pv6f

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.

The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.

EPSS

Процентиль: 58%
0.0037
Низкий

8.8 High

CVSS3

Дефекты

CWE-352
CWE-89

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user.

EPSS

Процентиль: 58%
0.0037
Низкий

8.8 High

CVSS3

Дефекты

CWE-352
CWE-89