The multimedia images WordPress plugin has SQL injection vulnerability
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | Sql injection | 2 Jan 202322:15 | – | prion |
![]() | CVE-2022-4370 Multimedial Images <= 1.0b - Admin+ SQLi | 2 Jan 202321:49 | – | vulnrichment |
![]() | CVE-2022-4370 | 2 Jan 202322:15 | – | nvd |
![]() | Multimedial Images <= 1.0b - Admin+ SQLi | 12 Dec 202200:00 | – | wpexploit |
![]() | Multimedial Images <= 1.0b - Admin+ SQLi | 12 Dec 202200:00 | – | wpvulndb |
![]() | CVE-2022-4370 Multimedial Images <= 1.0b - Admin+ SQLi | 2 Jan 202321:49 | – | cvelist |
[
{
"vendor": "Unknown",
"product": "multimedial images",
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThanOrEqual": "1.0b"
}
],
"defaultStatus": "affected",
"collectionURL": "https://wordpress.org/plugins"
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
page | query param | /wp-admin/options-general.php | SQL injection vulnerability due to lack of proper sanitization and escaping of parameters in SQL statement. | CWE-89 |
a | query param | /wp-admin/options-general.php | SQL injection vulnerability due to lack of proper sanitization and escaping of parameters in SQL statement. | CWE-89 |
id | query param | /wp-admin/options-general.php | SQL injection vulnerability due to lack of proper sanitization and escaping of parameters in SQL statement. | CWE-89 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo