CVE-2024-3265

The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters appended to an SQL query, making it possible for users with the administrator role to conduct SQL Injection attacks in the context of a multisite WordPress configurations.
Configurations

Configuration 1 (hide)

cpe:2.3:a:advance_search_project:advance_search:*:*:*:*:*:wordpress:*:*

History

08 May 2025, 19:14

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ - () https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:advance_search_project:advance_search:*:*:*:*:*:wordpress:*:*
First Time Advance Search Project advance Search
Advance Search Project
CWE CWE-89

Information

Published : 2024-04-25 22:15

Updated : 2025-05-08 19:14


NVD link : CVE-2024-3265

Mitre link : CVE-2024-3265

CVE.ORG link : CVE-2024-3265


JSON object : View

Products Affected

advance_search_project

  • advance_search
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')