Description
The CBX Petition for WordPress plugin through 1.0.3 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
References
https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035
ExploitThird Party Advisory
https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035
ExploitThird Party Advisory
Weaknesses
Could not find any weaknesses
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2023-01-23T14:15:14.577Z
2 years agoLast modified
2025-04-02T14:15:24.513Z
9 months ago