CVE-2022-4357
CVSS V2 None
CVSS V3 None
Description
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Overview
- CVE ID
- CVE-2022-4357
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Modified
- Published Version
- 2023-01-02T22:15:17
- Last Modified Date
- 2023-03-17T09:15:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.1.0 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4357 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4357 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-02 23:14:48 | Added to TrackCVE | |||
2023-01-02 23:14:49 | Weakness Enumeration | new | ||
2023-01-03 14:13:44 | 2023-01-03T13:26:23 | CVE Modified Date | updated | |
2023-01-03 14:13:44 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-05 18:19:59 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 20:20:00 | 2023-01-09T19:47:01 | CVE Modified Date | updated | |
2023-01-09 20:20:00 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-09 20:20:03 | CPE Information | updated | ||
2023-03-17 10:15:49 | 2023-03-17T09:15:12 | CVE Modified Date | updated | |
2023-03-17 10:15:49 | Analyzed | Modified | Vulnerability Status | updated |
2023-03-17 10:15:49 | The LetsRecover WordPress plugin through 1.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. | The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. | Description | updated |