2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-3720" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2022-11-21T11:15:20.823" ,
2025-04-30 18:04:01 +00:00
"lastModified" : "2025-04-30T16:15:24.630" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users"
2023-11-07 21:03:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento Event Monster de WordPress anterior a 1.2.0 no valida ni escapa algunos par\u00e1metros antes de usarlos en sentencias SQL, lo que podr\u00eda conducir a una inyecci\u00f3n SQL explotable por usuarios con altos privilegios."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2025-04-30 18:04:01 +00:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
}
]
} ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:awplife:event_monster:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "1.2.0" ,
"matchCriteriaId" : "122BC640-3980-40A1-BBFD-85590E10D565"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5" ,
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}