The WP Fundraising Donation and Crowdfunding Platform WordPress plugin before 1.5.0 does not sanitise and escape a parameter before using it in a SQL statement via one of it's REST route, leading to an SQL injection exploitable by unauthenticated users
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 05 Dec 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpmet fundengine
|
|
| CPEs | cpe:2.3:a:wpmet:fundengine:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpmet wp Fundraising Donation And Crowdfunding Platform
|
Wpmet fundengine
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T23:40:04.349Z
Reserved: 2022-02-28T00:00:00
Link: CVE-2022-0788
No data.
Status : Modified
Published: 2022-06-08T10:15:09.077
Modified: 2024-12-05T17:12:01.060
Link: CVE-2022-0788
No data.
OpenCVE Enrichment
No data.
Weaknesses