CVE-2022-3395

The WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:soflyy:wp_all_export:*:*:*:*:pro:wordpress:*:*

History

26 Oct 2022, 15:11

Type Values Removed Values Added
References (CONFIRM) https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 - (CONFIRM) https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0 - Exploit, Third Party Advisory
CPE cpe:2.3:a:soflyy:wp_all_export:*:*:*:*:pro:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

25 Oct 2022, 17:37

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-25 17:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-3395

Mitre link : CVE-2022-3395

CVE.ORG link : CVE-2022-3395


JSON object : View

Products Affected

soflyy

  • wp_all_export
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')