### [CVE-2022-0769](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0769) ![](https://img.shields.io/static/v1?label=Product&message=Users%20Ultra%20Membership%2C%20Users%20Community%20and%20Member%20Profiles%20With%20PayPal%20Integration%20Plugin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.1.0%3C%3D%203.1.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection. ### POC #### Reference - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/cyllective/CVEs