The LogDash Activity Log WordPress plugin before 1.1.4 hooks the wp_login_failed function (from src/Hooks/Users.php) in order to log failed login attempts to the database but it doesn't escape the username when it perform some SQL request leading to a SQL injection vulnerability which can be exploited using time-based technique by unauthenticated attacker
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b658e403-006c-4555-b1b2-3603e44f4411/ | Exploit Third Party Advisory |
Configurations
History
11 Jun 2025, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:deryckoe:logdash_activity_log:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/b658e403-006c-4555-b1b2-3603e44f4411/ - Exploit, Third Party Advisory | |
CWE | CWE-89 | |
First Time |
Deryckoe
Deryckoe logdash Activity Log |
16 May 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
16 May 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-15 20:15
Updated : 2025-06-11 19:24
NVD link : CVE-2023-6030
Mitre link : CVE-2023-6030
CVE.ORG link : CVE-2023-6030
JSON object : View
Products Affected
deryckoe
- logdash_activity_log
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')