Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xw39-q6xj-4gq5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).

EPSS

Процентиль: 79%
0.01311
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).

EPSS

Процентиль: 79%
0.01311
Низкий