### [CVE-2023-0220](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0220) ![](https://img.shields.io/static/v1?label=Product&message=Pinpoint%20Booking%20System&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.9.9.2.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Pinpoint Booking System WordPress plugin before 2.9.9.2.9 does not validate and escape one of its shortcode attributes before using it in a SQL statement, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks. ### POC #### Reference - https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c #### Github No PoCs found on GitHub currently.