The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b - Exploit, Third Party Advisory |
21 Aug 2023, 16:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b - Exploit, Third Party Advisory |
14 Aug 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 20:15
Updated : 2024-11-21 08:17
NVD link : CVE-2023-3435
Mitre link : CVE-2023-3435
CVE.ORG link : CVE-2023-3435
JSON object : View
Products Affected
solwininfotech
- user_activity_log
CWE
No CWE.