CVE-2022-0836

The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users
Configurations

Configuration 1 (hide)

cpe:2.3:a:semadatacoop:sema_api:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f - Exploit, Third Party Advisory

Information

Published : 2022-05-09 17:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0836

Mitre link : CVE-2022-0836

CVE.ORG link : CVE-2022-0836


JSON object : View

Products Affected

semadatacoop

  • sema_api
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')