The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
                
            Metrics
Affected Vendors & Products
Advisories
    No advisories yet.
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T23:40:03.754Z
Reserved: 2022-02-27T00:00:00
Link: CVE-2022-0769
No data.
Status : Modified
Published: 2022-04-25T16:16:07.997
Modified: 2024-11-21T06:39:21.530
Link: CVE-2022-0769
No data.
                        OpenCVE Enrichment
                    No data.