Description
The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.
References
https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
ExploitThird Party Advisory
https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2023-01-16T16:15:13.290
2 years agoLast modified
2025-04-04T19:15:43.767
2 months ago