CVE-2024-3060

The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 18:05

Type Values Removed Values Added
CPE cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*
First Time Enl Newsletter Plugin Project
Enl Newsletter Plugin Project enl-newsletter
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - Exploit, Third Party Advisory

Information

Published : 2024-04-26 05:15

Updated : 2025-05-07 18:05


NVD link : CVE-2024-3060

Mitre link : CVE-2024-3060

CVE.ORG link : CVE-2024-3060


JSON object : View

Products Affected

enl_newsletter_plugin_project

  • enl-newsletter
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')