Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43200 | The Visual Email Designer for WooCommerce WordPress plugin before 1.7.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author. |
Thu, 10 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-10T18:31:31.153Z
Reserved: 2022-11-04T13:42:33.471Z
Link: CVE-2022-3860
Updated: 2024-08-03T01:20:58.327Z
Status : Modified
Published: 2023-01-02T22:15:15.563
Modified: 2025-04-10T19:15:48.953
Link: CVE-2022-3860
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD