Severity
7.2HIGH
EPSS
0.6%
top 30.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 2
Latest updateJun 20

Description

The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-vc46-cf2x-6638: The LetsRecover WordPress plugin through 12023-01-03
CVEList
LetsRecover < 1.2.0 - Admin+ SQLi2023-01-02

📋Vendor Advisories

1
Red Hat
kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe2024-06-20
CVE-2022-4355 (HIGH CVSS 7.2) | The LetsRecover WordPress plugin be | cvebase.io