CVE-2022-4356

The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Configurations

Configuration 1 (hide)

cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*

History

10 Apr 2025, 19:15

Type Values Removed Values Added
References
  • () https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b/ -

21 Nov 2024, 07:35

Type Values Removed Values Added
Summary
  • (es) El complemento LetsRecover de WordPress anterior a 1.2.0 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL, lo que genera una inyección SQL explotable por usuarios con privilegios elevados, como el administrador.
References () https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_3 - Broken Link, Third Party Advisory () https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_3 - Broken Link, Third Party Advisory
References () https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b - Third Party Advisory () https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b - Third Party Advisory

17 Mar 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-02 22:15

Updated : 2025-04-10 19:15


NVD link : CVE-2022-4356

Mitre link : CVE-2022-4356

CVE.ORG link : CVE-2022-4356


JSON object : View

Products Affected

letsrecover_project

  • letsrecover
CWE

No CWE.