Description
The Easy Newsletter Signups WordPress plugin through 1.0.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57447 | The Easy Newsletter Signups WordPress plugin through 1.0.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T07:44:53.815Z
Reserved: 2023-09-21T17:15:36.929Z
Link: CVE-2023-5108
No data.
Status : Modified
Published: 2023-12-04T22:15:07.667
Modified: 2024-11-21T08:41:04.543
Link: CVE-2023-5108
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD