cve/2023/CVE-2023-5041.md

18 lines
814 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-5041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5041)
![](https://img.shields.io/static/v1?label=Product&message=Track%20The%20Click&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%200.3.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Track The Click WordPress plugin before 0.3.12 does not properly sanitize query parameters to the stats REST endpoint before using them in a database query, allowing a logged in user with an author role or higher to perform time based blind SQLi attacks on the database.
### POC
#### Reference
- https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
#### Github
No PoCs found on GitHub currently.