Логотип exploitDog
bind:CVE-2022-1683
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-1683

Количество 2

Количество 2

nvd логотип

CVE-2022-1683

больше 3 лет назад

The amtyThumb WordPress plugin through 4.2.0 does not sanitise and escape a parameter before using it in a SQL statement via its shortcode, leading to an SQL injection and is exploitable by any authenticated user (and not just Author+ like the original advisory mention) due to the fact that they can execute shortcodes via an AJAX action

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-5wv8-8c7g-gr98

больше 3 лет назад

The amtyThumb WordPress plugin through 4.2.0 does not sanitise and escape a parameter before using it in a SQL statement via its shortcode, leading to an SQL injection and is exploitable by any authenticated user (and not just Author+ like the original advisory mention) due to the fact that they can execute shortcodes via an AJAX action

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-1683

The amtyThumb WordPress plugin through 4.2.0 does not sanitise and escape a parameter before using it in a SQL statement via its shortcode, leading to an SQL injection and is exploitable by any authenticated user (and not just Author+ like the original advisory mention) due to the fact that they can execute shortcodes via an AJAX action

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-5wv8-8c7g-gr98

The amtyThumb WordPress plugin through 4.2.0 does not sanitise and escape a parameter before using it in a SQL statement via its shortcode, leading to an SQL injection and is exploitable by any authenticated user (and not just Author+ like the original advisory mention) due to the fact that they can execute shortcodes via an AJAX action

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу