Описание
The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.02 (исключая)
cpe:2.3:a:semadatacoop:sema_api:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 87%
0.03246
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
The SEMA API WordPress plugin through 3.64 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users
EPSS
Процентиль: 87%
0.03246
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89