The 5 Stars Rating Funnel WordPress Plugin | RRatingg WordPress plugin before 1.2.54 does not properly sanitise, validate and escape lead ids before using them in a SQL statement via the rrtngg_delete_leads AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue. There is an attempt to sanitise the input, using sanitize_text_field(), however such function is not intended to prevent SQL injections.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2022-04-25 16:16
Updated : 2022-05-12 14:15
NVD link : CVE-2022-0657
Mitre link : CVE-2022-0657
CVE.ORG link : CVE-2022-0657
JSON object : View
Products Affected
                5_stars_rating_funnel_project
- 5_stars_rating_funnel
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
