The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-51708 | The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Apr 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-10T19:13:36.450Z
Reserved: 2022-12-08T08:59:51.355Z
Link: CVE-2022-4357

Updated: 2024-08-03T01:34:50.165Z

Status : Modified
Published: 2023-01-02T22:15:17.433
Modified: 2025-04-10T19:15:53.733
Link: CVE-2022-4357

No data.

No data.