Metrics
Affected Vendors & Products
Solution
This vulnerability has already been fixed by SEUR in version 2.5.11, published on 04/16/2024. The latest version available is 2.5.14. SEUR recommends its customers to connect to its platform to download and update to the latest version of the module.
Workaround
No workaround given by the vendor.
Wed, 16 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seur
Seur seur |
|
CPEs | cpe:2.3:a:seur:seur:*:*:*:*:*:prestashop:*:* | |
Vendors & Products |
Seur
Seur seur |
Thu, 10 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seur Oficial Project
Seur Oficial Project seur Oficial |
|
CPEs | cpe:2.3:a:seur_oficial_project:seur_oficial:-:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Seur Oficial Project
Seur Oficial Project seur Oficial |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint. | |
Title | SQL injection vulnerability in SEUR plugin | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-10-10T13:52:51.793Z
Reserved: 2024-09-26T10:11:09.137Z
Link: CVE-2024-9201

Updated: 2024-10-10T13:52:43.153Z

Status : Analyzed
Published: 2024-10-10T11:15:13.760
Modified: 2024-10-16T16:55:44.817
Link: CVE-2024-9201

No data.

No data.