CVE-2022-3856

The Comic Book Management System WordPress plugin before 2.2.0 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inksplat:comic_book_management_system:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
Summary
  • (es) El complemento de WordPress del Comic Book Management System anterior a 2.2.0 no sanitiza ni escapa un parámetro antes de usarlo en una declaración SQL, lo que genera una inyección de SQL explotable por usuarios con un rol tan bajo como Administrador.
References () https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ - Broken Link () https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ - Broken Link
References () https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 - Exploit, Third Party Advisory

Information

Published : 2022-12-05 17:15

Updated : 2025-04-24 14:15


NVD link : CVE-2022-3856

Mitre link : CVE-2022-3856

CVE.ORG link : CVE-2022-3856


JSON object : View

Products Affected

inksplat

  • comic_book_management_system
CWE

No CWE.