Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r6g-wcvh-p5j6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.

The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.

EPSS

Процентиль: 68%
0.00582
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.

EPSS

Процентиль: 68%
0.00582
Низкий

Дефекты

CWE-89