The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050/ |
Configurations
Configuration 1 (hide)
|
History
12 Dec 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-06-19 11:15
Updated : 2024-12-12 17:15
NVD link : CVE-2023-2492
Mitre link : CVE-2023-2492
CVE.ORG link : CVE-2023-2492
JSON object : View
Products Affected
querywall_plug\'n_play_firewall_project
- querywall_plug\'n_play_firewall
CWE
No CWE.