The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Joomlaserviceprovider
Joomlaserviceprovider jsp Store Locator
Weaknesses CWE-89
CPEs cpe:2.3:a:joomlaserviceprovider:jsp_store_locator:*:*:*:*:*:wordpress:*:*
Vendors & Products Joomlaserviceprovider
Joomlaserviceprovider jsp Store Locator

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks.
Title JSP Store Locator <= 1.0 - Contributor+ SQL Injection
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-05-20T19:34:46.725Z

Reserved: 2024-11-15T17:51:09.131Z

Link: CVE-2024-11267

cve-icon Vulnrichment

Updated: 2025-05-19T20:36:16.733Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:34.683

Modified: 2025-06-12T16:58:22.630

Link: CVE-2024-11267

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.