The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit WordPress plugin before 3.3.0 does not sanitize and escape the bwfan-track-id  parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/fab29b59-7e87-4289-88dd-ed5520260c26/ | Exploit Third Party Advisory | 
Configurations
                    History
                    15 May 2025, 16:28
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Funnelkit funnelkit Automations
         Funnelkit  | 
|
| CPE | cpe:2.3:a:funnelkit:funnelkit_automations:*:*:*:*:*:wordpress:*:* | |
| References | () https://wpscan.com/vulnerability/fab29b59-7e87-4289-88dd-ed5520260c26/ - Exploit, Third Party Advisory | |
| CWE | CWE-89 | 
15 Nov 2024, 20:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 8.6  | 
15 Nov 2024, 13:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
14 Nov 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-14 06:15
Updated : 2025-05-15 16:28
NVD link : CVE-2024-9186
Mitre link : CVE-2024-9186
CVE.ORG link : CVE-2024-9186
JSON object : View
Products Affected
                funnelkit
- funnelkit_automations
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
