Description
The Testimonial WordPress Plugin WordPress plugin before 1.4.7 does not validate and escape the id parameter before using it in a SQL statement when retrieving a testimonial to edit, leading to a SQL Injection
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28833 | The Testimonial WordPress Plugin WordPress plugin before 1.4.7 does not validate and escape the id parameter before using it in a SQL statement when retrieving a testimonial to edit, leading to a SQL Injection |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T03:59:22.478Z
Reserved: 2022-01-24T00:00:00.000Z
Link: CVE-2022-23911
No data.
Status : Modified
Published: 2022-02-28T09:15:09.353
Modified: 2024-11-21T06:49:26.913
Link: CVE-2022-23911
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD