Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-0412
Analyzed
More InfoOfficial Page
Source-contact@wpscan.com
View Known Exploited Vulnerability (KEV) details
Published At-28 Feb, 2022 | 09:15
Updated At-08 Mar, 2022 | 17:02

The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

templateinvaders
templateinvaders
>>ti_woocommerce_wishlist>>Versions before 1.40.1(exclusive)
cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:*:wordpress:*:*
templateinvaders
templateinvaders
>>ti_woocommerce_wishlist>>Versions before 1.40.1(exclusive)
cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:pro:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-89Primarycontact@wpscan.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://plugins.trac.wordpress.org/changeset/2668899contact@wpscan.com
Release Notes
Third Party Advisory
https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682contact@wpscan.com
Exploit
Third Party Advisory
Change History
0Changes found

Details not found