The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T21:33:05.100Z
Reserved: 2024-06-20T14:26:53.849Z
Link: CVE-2024-6205
Updated: 2024-08-01T21:33:05.100Z
Status : Modified
Published: 2024-07-19T06:15:03.817
Modified: 2024-11-21T09:49:11.343
Link: CVE-2024-6205
No data.
OpenCVE Enrichment
No data.
Weaknesses