66 lines
1.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2023-0765",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-04-17T13:15:37.953",
"lastModified": "2023-11-07T04:01:25.343",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not properly escape values used in SQL queries, leading to an Blind SQL Injection vulnerability. The attacker must have at least the privileges of an Author, and the vendor's Slider plugin (https://wordpress.org/plugins/slider-bws/) must also be installed for this vulnerability to be exploitable."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"configurations": [
2023-04-24 12:24:31 +02:00
{
"nodes": [
2023-04-24 12:24:31 +02:00
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.7.0",
"matchCriteriaId": "F42F3989-E1D7-49DD-A24E-AECC5D4495CC"
}
]
2023-04-24 12:24:31 +02:00
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}