The LetsRecover WordPress plugin before 1.2.0 is vulnerable to SQL injection
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Sql injection | 2 Jan 202322:15 | – | prion |
![]() | CVE-2022-4355 | 2 Jan 202322:15 | – | nvd |
![]() | LetsRecover < 1.2.0 - Admin+ SQLi | 9 Dec 202200:00 | – | wpvulndb |
![]() | CVE-2022-4355 LetsRecover < 1.2.0 - Admin+ SQLi | 2 Jan 202321:49 | – | cvelist |
![]() | LetsRecover < 1.2.0 - Admin+ SQLi | 9 Dec 202200:00 | – | wpexploit |
![]() | [SECURITY] Fedora 36 Update: curl-7.82.0-12.fc36 | 28 Dec 202201:40 | – | fedora |
![]() | [SECURITY] Fedora 37 Update: curl-7.85.0-5.fc37 | 26 Dec 202201:06 | – | fedora |
[
{
"vendor": "Unknown",
"product": "LetsRecover",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThan": "1.2.0"
}
],
"defaultStatus": "unaffected",
"collectionURL": "https://wordpress.org/plugins"
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
page | query param | /wp-admin/admin.php | SQL injection vulnerability due to improper sanitization and escaping of parameters. | CWE-89, CWE-20 |
subscriber_id | query param | /wp-admin/admin.php | SQL injection vulnerability due to improper sanitization and escaping of parameters. | CWE-89, CWE-20 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo