CVE-2022-4546
CVSS V2 None
CVSS V3 None
Description
The Mapwiz WordPress plugin through 1.0.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Overview
- CVE ID
- CVE-2022-4546
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-13T15:15:17
- Last Modified Date
- 2023-02-23T04:51:43
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:conceptbeans:mapwiz:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.0.1 |
References
Reference URL | Reference Tags |
---|---|
https://bulletin.iese.de/post/mapwiz_1-0-1/ | Broken Link |
https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4546 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4546 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:37:08 | Added to TrackCVE | |||
2023-04-17 07:37:10 | Weakness Enumeration | new |