Логотип exploitDog
bind:CVE-2024-6205
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6205

Количество 2

Количество 2

nvd логотип

CVE-2024-6205

больше 1 года назад

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-h8w3-xwp6-m9v8

больше 1 года назад

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6205

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.

CVSS3: 9.8
90%
Критический
больше 1 года назад
github логотип
GHSA-h8w3-xwp6-m9v8

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.

CVSS3: 9.8
90%
Критический
больше 1 года назад

Уязвимостей на страницу