### [CVE-2023-2601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2601) ![](https://img.shields.io/static/v1?label=Product&message=wpbrutalai&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF. ### POC #### Reference - http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html - https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd #### Github No PoCs found on GitHub currently.