Description


The Team WordPress plugin before 5.0.11 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.

Related CPE's


Could not find any relations

Weaknesses


Could not find any weaknesses

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

8.6 · High

Information


Source identifier

[email protected]

Vulnerability status

Received

Published

2026-01-05T06:16:02.923Z

42 hours ago

Last modified

2026-01-05T17:15:44.890Z

31 hours ago