The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | Exploit Third Party Advisory | 
| http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | Exploit Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2023-06-27 14:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2601
Mitre link : CVE-2023-2601
CVE.ORG link : CVE-2023-2601
JSON object : View
Products Affected
                wp_brutal_ai_project
- wp_brutal_ai
 
CWE
                No CWE.
