Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q24x-376x-hj43

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a product_id POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a product_id POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

EPSS

Процентиль: 68%
0.00567
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a `product_id` POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

EPSS

Процентиль: 68%
0.00567
Низкий

Дефекты

CWE-89