The LogDash Activity Log WordPress plugin before 1.1.4 hooks the wp_login_failed function (from src/Hooks/Users.php) in order to log failed login attempts to the database but it doesn't escape the username when it perform some SQL request leading to a SQL injection vulnerability which can be exploited using time-based technique by unauthenticated attacker
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b658e403-006c-4555-b1b2-3603e44f4411/ | Exploit Third Party Advisory |
Configurations
History
11 Jun 2025, 19:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-15 20:15
Updated : 2025-06-11 19:24
NVD link : CVE-2023-6030
Mitre link : CVE-2023-6030
CVE.ORG link : CVE-2023-6030
JSON object : View
Products Affected
deryckoe
- logdash_activity_log
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')