The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin, version 1.5.3, is vulnerable to Post-Authenticated SQL Injection via multiple JSON parameters in the /wp-json/burst/v1/data/compare endpoint. Affected parameters include 'browser', 'device', 'page_id', 'page_url', 'platform', and 'referrer'. This vulnerability arises due to insufficient escaping of user-supplied parameters and the lack of adequate preparation in SQL queries. As a result, authenticated attackers with editor access or higher can append additional SQL queries into existing ones, potentially leading to unauthorized access to sensitive information from the database.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-01-17T04:32:16.771Z
Updated: 2024-08-01T18:04:49.644Z
Reserved: 2024-01-10T17:00:07.732Z
Link: CVE-2024-0405
Vulnrichment
No data.
NVD
Status : Modified
Published: 2024-01-17T05:15:08.913
Modified: 2024-11-21T08:46:30.777
Link: CVE-2024-0405
Redhat
No data.