cve/2022/CVE-2022-0769.md

19 lines
986 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0769](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0769)
![](https://img.shields.io/static/v1?label=Product&message=Users%20Ultra%20Membership%2C%20Users%20Community%20and%20Member%20Profiles%20With%20PayPal%20Integration%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.0%3C%3D%203.1.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
### POC
#### Reference
- https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/cyllective/CVEs