CVE-2022-4268

CVSS V2 None CVSS V3 None
Description
The Plugin Logic WordPress plugin before 1.0.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Overview
  • CVE ID
  • CVE-2022-4268
  • Assigner
  • contact@wpscan.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-12-26T13:15:14
  • Last Modified Date
  • 2023-03-06T14:15:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:plugin_logic_project:plugin_logic:*:*:*:*:*:wordpress:*:* 1 OR 1.0.7
History
Created Old Value New Value Data Type Notes
2022-12-26 13:19:19 Added to TrackCVE
2022-12-26 13:19:20 Weakness Enumeration new
2022-12-27 14:16:03 2022-12-27T13:48:11 CVE Modified Date updated
2022-12-27 14:16:03 Received Awaiting Analysis Vulnerability Status updated
2023-01-03 16:16:57 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-04 22:17:18 2023-01-04T21:38:12 CVE Modified Date updated
2023-01-04 22:17:18 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-04 22:17:20 CPE Information updated
2023-03-06 15:17:38 2023-03-06T14:15:09 CVE Modified Date updated
2023-03-06 15:17:38 Analyzed Modified Vulnerability Status updated
2023-03-06 15:17:39 The Plugin Logic WordPress plugin through 1.0.7 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin The Plugin Logic WordPress plugin before 1.0.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin Description updated