cve/2022/CVE-2022-4230.md

18 lines
870 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-4230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4230)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Statistics&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Statistics WordPress plugin before 13.2.9 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
### POC
#### Reference
- https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312
#### Github
- https://github.com/ARPSyndicate/cvemon