CVE-2022-4355

The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Configurations

Configuration 1 (hide)

cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*

History

10 Apr 2025, 19:15

Type Values Removed Values Added
References
  • () https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759/ -

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_2 - Broken Link, Third Party Advisory () https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_2 - Broken Link, Third Party Advisory
References () https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759 - Third Party Advisory () https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759 - Third Party Advisory
Summary
  • (es) El complemento LetsRecover de WordPress anterior a 1.2.0 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL, lo que genera una inyección de SQL explotable por usuarios con privilegios elevados, como el administrador.

17 Mar 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-02 22:15

Updated : 2025-04-10 19:15


NVD link : CVE-2022-4355

Mitre link : CVE-2022-4355

CVE.ORG link : CVE-2022-4355


JSON object : View

Products Affected

letsrecover_project

  • letsrecover
CWE

No CWE.