In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://www.rapid7.com/db/modules/auxiliary/admin/http/wp_google_maps_sqli | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?old_path=%2Fwp-google-maps&old=2061433&new_path=%2Fwp-google-maps&new=2061434&sfp_email=&sfph_mail=#file755 | Patch Third Party Advisory |
https://wordpress.org/plugins/wp-google-maps/#developers | Third Party Advisory |
Configurations
History
23 May 2023, 20:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:* |
03 May 2022, 14:49
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | (MISC) http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-04-02 18:30
Updated : 2024-02-04 20:20
NVD link : CVE-2019-10692
Mitre link : CVE-2019-10692
CVE.ORG link : CVE-2019-10692
JSON object : View
Products Affected
codecabin
- wp_go_maps
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')