The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c | Exploit Patch Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2022-09-19 14:15
Updated : 2022-12-03 02:40
NVD link : CVE-2022-2840
Mitre link : CVE-2022-2840
CVE.ORG link : CVE-2022-2840
JSON object : View
Products Affected
                zephyr_project_manager_project
- zephyr_project_manager
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
