cve/2022/CVE-2022-0771.md

19 lines
848 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0771](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0771)
![](https://img.shields.io/static/v1?label=Product&message=SiteSuperCharger&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0%3C%205.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The SiteSuperCharger WordPress plugin before 5.2.0 does not validate, sanitise and escape various user inputs before using them in SQL statements via AJAX actions (available to both unauthenticated and authenticated users), leading to Unauthenticated SQL Injections
### POC
#### Reference
- https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/cyllective/CVEs