Description
participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).
Published: 2020-02-10
Score: 7.5 High
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-29444 participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).
History

No history.

Subscriptions

Xnau Participants Database
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:03:46.374Z

Reserved: 2020-02-03T00:00:00.000Z

Link: CVE-2020-8596

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-11T12:15:21.337

Modified: 2024-11-21T05:39:05.823

Link: CVE-2020-8596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses