### [CVE-2023-2719](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2719) ![](https://img.shields.io/static/v1?label=Product&message=SupportCandy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.1.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. ### POC #### Reference - https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 #### Github No PoCs found on GitHub currently.