32 lines
986 B
JSON
Raw Normal View History

{
"id": "CVE-2023-3077",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-07-10T16:15:54.913",
"lastModified": "2023-07-10T16:27:17.833",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432",
"source": "contact@wpscan.com"
}
]
}