Описание
The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.
Ссылки
- Broken Link
- ExploitThird Party Advisory
- Broken Link
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.0 (включая)
cpe:2.3:a:thedotstore:conditional_payment_methods_for_woocommerce:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 74%
0.00797
Низкий
7.2 High
CVSS3
Дефекты
CWE-89
Связанные уязвимости
CVSS3: 7.2
github
около 3 лет назад
The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.
EPSS
Процентиль: 74%
0.00797
Низкий
7.2 High
CVSS3
Дефекты
CWE-89