The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-27 14:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2601
Mitre link : CVE-2023-2601
CVE.ORG link : CVE-2023-2601
JSON object : View
Products Affected
wp_brutal_ai_project
- wp_brutal_ai
CWE
No CWE.