### [CVE-2023-6373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6373) ![](https://img.shields.io/static/v1?label=Product&message=ArtPlacer%20Widget&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.20.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The ArtPlacer Widget WordPress plugin before 2.20.7 does not sanitize and escape the "id" parameter before submitting the query, leading to a SQLI exploitable by editors and above. Note: Due to the lack of CSRF check, the issue could also be exploited via a CSRF against a logged editor (or above) ### POC #### Reference - https://wpscan.com/vulnerability/afc11c92-a7c5-4e55-8f34-f2235438bd1b/ #### Github No PoCs found on GitHub currently.