The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
[
{
"product": "KiviCare – Clinic & Patient Management System (EHR)",
"vendor": "Unknown",
"versions": [
{
"lessThan": "2.3.9",
"status": "affected",
"version": "2.3.9",
"versionType": "custom"
}
]
}
]