### [CVE-2023-2111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2111) ![](https://img.shields.io/static/v1?label=Product&message=Fast%20%26%20Effective%20Popups%20%26%20Lead-Generation%20for%20WordPress&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.1.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database. ### POC #### Reference - https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2 #### Github No PoCs found on GitHub currently.