The Event Monster WordPress plugin before 1.2.0 is vulnerable to SQL Injection
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Event Monster < 1.2.1 - Admin+ SQLi | 31 Oct 202200:00 | – | wpexploit |
![]() | WordPress Event Monster plugin <= 1.2.0 - Auth. SQL Injection (SQLi) vulnerability | 31 Oct 202200:00 | – | patchstack |
![]() | WordPress Event Monster SQL Injection Vulnerability | 23 Nov 202200:00 | – | cnvd |
![]() | Event Monster < 1.2.1 - Admin+ SQLi | 31 Oct 202200:00 | – | wpvulndb |
![]() | CVE-2022-3720 Event Monster < 1.2.1 - Admin+ SQLi | 21 Nov 202200:00 | – | cvelist |
![]() | Sql injection | 21 Nov 202211:15 | – | prion |
![]() | CVE-2022-3720 | 21 Nov 202211:15 | – | nvd |
[
{
"vendor": "Unknown",
"product": "Event Monster",
"collectionURL": "https://wordpress.org/plugins",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThan": "1.2.0"
}
],
"defaultStatus": "unaffected"
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
action | request body | /wp-admin/edit.php?post_type=awl_event_monster&page=em-visitors-page | The plugin does not validate and escape parameters before using them in SQL statements, allowing for potential SQL Injection. | CWE-89, CWE-20 |
nonce | request body | /wp-admin/edit.php?post_type=awl_event_monster&page=em-visitors-page | The plugin does not validate and escape parameters before using them in SQL statements, allowing for potential SQL Injection. | CWE-89, CWE-20 |
id | request body | /wp-admin/edit.php?post_type=awl_event_monster&page=em-visitors-page | The plugin does not validate and escape parameters before using them in SQL statements, allowing for potential SQL Injection. | CWE-89, CWE-20 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo