The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T23:40:03.754Z
Reserved: 2022-02-27T00:00:00
Link: CVE-2022-0769
No data.
Status : Modified
Published: 2022-04-25T16:16:07.997
Modified: 2024-11-21T06:39:21.530
Link: CVE-2022-0769
No data.
OpenCVE Enrichment
No data.
Weaknesses