Описание
The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a product_id POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
Ссылки
- ExploitPatchThird Party Advisory
- ExploitThird Party Advisory
- ExploitPatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.3.1.0 (исключая)
cpe:2.3:a:dpl:product_feed_on_woocommerce:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 68%
0.00567
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a `product_id` POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
EPSS
Процентиль: 68%
0.00567
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89