CVE-2024-3060

The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 18:05

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*
First Time Enl Newsletter Plugin Project
Enl Newsletter Plugin Project enl-newsletter

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ -

03 Jul 2024, 02:05

Type Values Removed Values Added
CWE CWE-89
Summary
  • (es) El complemento ENL Newsletter de WordPress hasta la versión 1.0.1 no sanitiza ni escapa un parámetro antes de usarlo en una declaración SQL, lo que permite a admin+ realizar ataques de inyección SQL.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.5

26 Apr 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-26 05:15

Updated : 2025-05-07 18:05


NVD link : CVE-2024-3060

Mitre link : CVE-2024-3060

CVE.ORG link : CVE-2024-3060


JSON object : View

Products Affected

enl_newsletter_plugin_project

  • enl-newsletter
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')