CVE-2019-10692

In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement.
Configurations

Configuration 1 (hide)

cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:*

History

23 May 2023, 20:30

Type Values Removed Values Added
CPE cpe:2.3:a:codecabin:wp_google_maps:*:*:*:*:*:wordpress:*:* cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:*

03 May 2022, 14:49

Type Values Removed Values Added
CWE CWE-20 CWE-89
References (MISC) http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html - (MISC) http://packetstormsecurity.com/files/159640/WordPress-Rest-Google-Maps-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2019-04-02 18:30

Updated : 2024-02-04 20:20


NVD link : CVE-2019-10692

Mitre link : CVE-2019-10692

CVE.ORG link : CVE-2019-10692


JSON object : View

Products Affected

codecabin

  • wp_go_maps
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')