Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15329 | The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks. |
Thu, 12 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joomlaserviceprovider
Joomlaserviceprovider jsp Store Locator |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:joomlaserviceprovider:jsp_store_locator:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Joomlaserviceprovider
Joomlaserviceprovider jsp Store Locator |
Tue, 20 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks. | |
| Title | JSP Store Locator <= 1.0 - Contributor+ SQL Injection | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-05-20T19:34:46.725Z
Reserved: 2024-11-15T17:51:09.131Z
Link: CVE-2024-11267
Updated: 2025-05-19T20:36:16.733Z
Status : Analyzed
Published: 2025-05-15T20:15:34.683
Modified: 2025-06-12T16:58:22.630
Link: CVE-2024-11267
No data.
OpenCVE Enrichment
No data.
EUVD