CVE-2024-3060

The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 18:05

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - Exploit, Third Party Advisory
First Time Enl Newsletter Plugin Project
Enl Newsletter Plugin Project enl-newsletter
CPE cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ -

03 Jul 2024, 02:05

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.5

26 Apr 2024, 12:58

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-26 05:15

Updated : 2025-05-07 18:05


NVD link : CVE-2024-3060

Mitre link : CVE-2024-3060

CVE.ORG link : CVE-2024-3060


JSON object : View

Products Affected

enl_newsletter_plugin_project

  • enl-newsletter
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')