Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adivaha
Adivaha wordpress Adivaha Travel Plugin Wordpress Wordpress wordpress |
|
| Vendors & Products |
Adivaha
Adivaha wordpress Adivaha Travel Plugin Wordpress Wordpress wordpress |
Thu, 09 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pid' GET parameter. Attackers can send requests to the /mobile-app/v3/ endpoint with crafted 'pid' values using XOR-based payloads to extract sensitive database information or cause denial of service. | |
| Title | WordPress adivaha Travel Plugin 2.3 SQL Injection via pid | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-14T14:49:14.120Z
Reserved: 2026-04-09T20:41:39.641Z
Link: CVE-2023-54359
Updated: 2026-04-14T14:49:07.370Z
Status : Deferred
Published: 2026-04-09T21:16:05.153
Modified: 2026-04-15T15:00:32.790
Link: CVE-2023-54359
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:29:15Z