The EazyDocs WordPress plugin before 2.3.4 does not properly sanitize and escape "data" parameter before using it in an SQL statement via an AJAX action, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T08:21:17.100Z
Reserved: 2023-11-08T16:43:36.470Z
Link: CVE-2023-6035

No data.

Status : Modified
Published: 2023-12-11T20:15:07.420
Modified: 2024-11-21T08:43:01.037
Link: CVE-2023-6035

No data.

No data.