cve/2023/CVE-2023-6373.md

19 lines
970 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-6373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6373)
![](https://img.shields.io/static/v1?label=Product&message=ArtPlacer%20Widget&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.20.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The ArtPlacer Widget WordPress plugin before 2.20.7 does not sanitize and escape the "id" parameter before submitting the query, leading to a SQLI exploitable by editors and above. Note: Due to the lack of CSRF check, the issue could also be exploited via a CSRF against a logged editor (or above)
### POC
#### Reference
- https://wpscan.com/vulnerability/afc11c92-a7c5-4e55-8f34-f2235438bd1b/
#### Github
No PoCs found on GitHub currently.