### [CVE-2022-1685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1685) ![](https://img.shields.io/static/v1?label=Product&message=Five%20Minute%20Webshop&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.3.2%3C%3D%201.3.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) ### Description The Five Minute Webshop WordPress plugin through 1.3.2 does not properly validate and sanitise the orderby parameter before using it in a SQL statement via the Manage Products admin page, leading to an SQL Injection ### POC #### Reference - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97 #### Github - https://github.com/ARPSyndicate/cvemon