Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43889 | The WordPress Database Administrator WordPress plugin through 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. |
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-06-11T16:48:54.966Z
Reserved: 2023-06-12T16:39:15.527Z
Link: CVE-2023-3211
Updated: 2024-08-02T06:48:08.128Z
Status : Modified
Published: 2024-01-16T16:15:11.290
Modified: 2025-06-11T17:15:32.187
Link: CVE-2023-3211
No data.
OpenCVE Enrichment
No data.
EUVD