Description
The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.
References
https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
ExploitThird Party Advisory
https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-01-16T15:15:13.290Z
3 years agoLast modified
2025-04-04T17:15:43.767Z
11 months ago