Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34258 | The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. |
Mon, 09 Dec 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-12-09T21:17:44.825Z
Reserved: 2023-05-19T07:59:37.679Z
Link: CVE-2023-2805
Updated: 2024-08-02T06:33:05.771Z
Status : Modified
Published: 2023-06-19T11:15:10.710
Modified: 2024-11-21T07:59:19.497
Link: CVE-2023-2805
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD