### [CVE-2022-4230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4230) ![](https://img.shields.io/static/v1?label=Product&message=WP%20Statistics&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The WP Statistics WordPress plugin before 13.2.9 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well. ### POC #### Reference - https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312 #### Github - https://github.com/ARPSyndicate/cvemon