The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-19 11:15
Updated : 2023-11-07 04:12
NVD link : CVE-2023-2492
Mitre link : CVE-2023-2492
CVE.ORG link : CVE-2023-2492
JSON object : View
Products Affected
querywall_plug\'n_play_firewall_project
- querywall_plug\'n_play_firewall
CWE
No CWE.