Description
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T21:33:05.100Z
Reserved: 2024-06-20T14:26:53.849Z
Link: CVE-2024-6205
Updated: 2024-08-01T21:33:05.100Z
Status : Modified
Published: 2024-07-19T06:15:03.817
Modified: 2024-11-21T09:49:11.343
Link: CVE-2024-6205
No data.
OpenCVE Enrichment
No data.
Weaknesses