Description
The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'couponId' parameter of the 'recreate_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2024-08-17
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44085 The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'couponId' parameter of the 'recreate_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Mon, 19 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Tagdiv
Tagdiv opt In Builder
CPEs cpe:2.3:a:tagdiv:opt_in_builder:*:*:*:*:*:*:*:*
Vendors & Products Tagdiv
Tagdiv opt In Builder
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 Aug 2024 09:45:00 +0000

Type Values Removed Values Added
Description The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'couponId' parameter of the 'recreate_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title tagDiv Opt-In Builder <= 1.4.4 - Authenticated (Admin+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Tagdiv Opt In Builder
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-19T16:45:37.040Z

Reserved: 2023-06-26T18:11:07.578Z

Link: CVE-2023-3419

cve-icon Vulnrichment

Updated: 2024-08-19T16:45:31.493Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-17T10:15:07.633

Modified: 2024-08-19T12:59:59.177

Link: CVE-2023-3419

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses