Description
The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44099 | The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks. |
References
History
Wed, 09 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-09T13:21:07.606Z
Reserved: 2023-06-27T17:40:30.280Z
Link: CVE-2023-3435
Updated: 2024-08-02T06:55:03.386Z
Status : Modified
Published: 2023-08-14T20:15:11.747
Modified: 2024-11-21T08:17:15.720
Link: CVE-2023-3435
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD