The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-14T14:15:32.858Z
Reserved: 2022-11-22T08:44:29.268Z
Link: CVE-2022-4117
Updated: 2024-08-03T01:27:54.505Z
Status : Modified
Published: 2022-12-26T13:15:12.373
Modified: 2025-04-14T15:15:22.283
Link: CVE-2022-4117
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.