Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34183 | The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. |
Thu, 12 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-12-12T21:03:39.440Z
Reserved: 2023-05-15T19:35:28.158Z
Link: CVE-2023-2719
Updated: 2024-08-02T06:33:05.256Z
Status : Modified
Published: 2023-06-19T11:15:10.487
Modified: 2024-12-12T21:15:07.120
Link: CVE-2023-2719
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD