CVE-2022-0836

The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:semadatacoop:sema_api:*:*:*:*:*:wordpress:*:*

History

08 Jun 2022, 10:15

Type Values Removed Values Added
Summary The SEMA API WordPress plugin through 3.64 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users

16 May 2022, 15:09

Type Values Removed Values Added
First Time Semadatacoop
Semadatacoop sema Api
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:semadatacoop:sema_api:*:*:*:*:*:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f - (MISC) https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f - Exploit, Third Party Advisory

09 May 2022, 17:23

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-09 17:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-0836

Mitre link : CVE-2022-0836

CVE.ORG link : CVE-2022-0836


JSON object : View

Products Affected

semadatacoop

  • sema_api
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')