The FL3R FeelBox WordPress plugin through 8.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8 | Exploit Third Party Advisory |
Configurations
History
07 Oct 2025, 15:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Armandofiore
Armandofiore fl3r Feelbox |
|
| CWE | CWE-89 | |
| CPE | cpe:2.3:a:armandofiore:fl3r_feelbox:*:*:*:*:*:wordpress:*:* |
Information
Published : 2023-02-13 15:15
Updated : 2025-10-07 15:35
NVD link : CVE-2022-4445
Mitre link : CVE-2022-4445
CVE.ORG link : CVE-2022-4445
JSON object : View
Products Affected
armandofiore
- fl3r_feelbox
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
