Логотип exploitDog
bind:CVE-2022-0846
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-0846

Количество 2

Количество 2

nvd логотип

CVE-2022-0846

почти 4 года назад

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-v734-49qc-6vhm

почти 4 года назад

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-0846

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users

CVSS3: 9.8
71%
Высокий
почти 4 года назад
github логотип
GHSA-v734-49qc-6vhm

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users

CVSS3: 9.8
71%
Высокий
почти 4 года назад

Уязвимостей на страницу