Description
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
Published: 2024-07-19
Score: 9.8 Critical
EPSS: 90.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Payplus Payplus Payment Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-08-01T21:33:05.100Z

Reserved: 2024-06-20T14:26:53.849Z

Link: CVE-2024-6205

cve-icon Vulnrichment

Updated: 2024-08-01T21:33:05.100Z

cve-icon NVD

Status : Modified

Published: 2024-07-19T06:15:03.817

Modified: 2024-11-21T09:49:11.343

Link: CVE-2024-6205

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses