Описание
The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the type parameter in the erp/v1/accounting/v1/people REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.12.4 (исключая)
cpe:2.3:a:wedevs:wp_erp:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 96%
0.28228
Средний
7.2 High
CVSS3
Дефекты
Связанные уязвимости
CVSS3: 7.2
github
больше 2 лет назад
The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
EPSS
Процентиль: 96%
0.28228
Средний
7.2 High
CVSS3