Description
The Team WordPress plugin before 5.0.11 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Related CPE's
Could not find any relations
Weaknesses
Could not find any weaknesses
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 · High
Information
Source identifier
Vulnerability status
Received
Published
2026-01-05T06:16:02.923Z
42 hours agoLast modified
2026-01-05T17:15:44.890Z
31 hours ago