Description
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T23:40:03.754Z
Reserved: 2022-02-27T00:00:00.000Z
Link: CVE-2022-0769
No data.
Status : Modified
Published: 2022-04-25T16:16:07.997
Modified: 2024-11-21T06:39:21.530
Link: CVE-2022-0769
No data.
OpenCVE Enrichment
No data.
Weaknesses