cve/2023/CVE-2023-6035.md

18 lines
779 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-6035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6035)
![](https://img.shields.io/static/v1?label=Product&message=EazyDocs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The EazyDocs WordPress plugin before 2.3.4 does not properly sanitize and escape "data" parameter before using it in an SQL statement via an AJAX action, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/44f5a29a-05f9-40d2-80f2-6fb2bda60d79
#### Github
No PoCs found on GitHub currently.