The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter via the erp/v1/accounting/v1/vendors/1/products/ REST route in all versions up to, and including, 1.12.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with admin or accounting manager privileges, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-03-29T06:44:03.130Z

Updated: 2024-08-23T13:28:41.286Z

Reserved: 2024-01-26T16:44:02.583Z

Link: CVE-2024-0956

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:28.964Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-29T07:15:42.480

Modified: 2024-11-21T08:47:52.523

Link: CVE-2024-0956

cve-icon Redhat

No data.