CVE-2022-4356
CVSS V2 None
CVSS V3 None
Description
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Overview
- CVE ID
- CVE-2022-4356
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Modified
- Published Version
- 2023-01-02T22:15:17
- Last Modified Date
- 2023-03-17T09:15:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.1.0 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4356 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4356 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-02 23:14:47 | Added to TrackCVE | |||
2023-01-02 23:14:49 | Weakness Enumeration | new | ||
2023-01-03 14:13:43 | 2023-01-03T13:26:23 | CVE Modified Date | updated | |
2023-01-03 14:13:43 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-05 18:19:58 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 20:19:59 | 2023-01-09T19:35:38 | CVE Modified Date | updated | |
2023-01-09 20:19:59 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-09 20:20:02 | CPE Information | updated | ||
2023-03-17 10:15:48 | 2023-03-17T09:15:12 | CVE Modified Date | updated | |
2023-03-17 10:15:48 | Analyzed | Modified | Vulnerability Status | updated |
2023-03-17 10:15:49 | The LetsRecover WordPress plugin through 1.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | Description | updated |