cve/2023/CVE-2023-2719.md

18 lines
784 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-2719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2719)
![](https://img.shields.io/static/v1?label=Product&message=SupportCandy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.1.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber.
### POC
#### Reference
- https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35
#### Github
No PoCs found on GitHub currently.