cve/2023/CVE-2023-0955.md

18 lines
866 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-0955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0955)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Statistics&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2014.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
### POC
#### Reference
- https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8
#### Github
No PoCs found on GitHub currently.