Описание
The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.9.8 (исключая)
cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 98%
0.58815
Средний
9.8 Critical
CVSS3
Дефекты
Связанные уязвимости
CVSS3: 9.8
github
больше 2 лет назад
The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.
EPSS
Процентиль: 98%
0.58815
Средний
9.8 Critical
CVSS3