Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33632 | The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database. |
Fri, 10 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-01-10T16:13:26.994Z
Reserved: 2023-04-17T08:05:05.951Z
Link: CVE-2023-2111
Updated: 2024-08-02T06:12:20.401Z
Status : Modified
Published: 2023-05-30T08:15:09.837
Modified: 2025-01-10T17:15:11.043
Link: CVE-2023-2111
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD