CVE-2022-2269

The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capability (by default admins), leading to an SQL injection
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpwhitesecurity:website_file_changes_monitor:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 - Exploit, Third Party Advisory

12 Aug 2022, 13:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 - (MISC) https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65 - Exploit, Third Party Advisory
CPE cpe:2.3:a:wpwhitesecurity:website_file_changes_monitor:*:*:*:*:*:wordpress:*:*

08 Aug 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-08 14:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2269

Mitre link : CVE-2022-2269

CVE.ORG link : CVE-2022-2269


JSON object : View

Products Affected

wpwhitesecurity

  • website_file_changes_monitor
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')