CVE-2023-2719

CWE-89SQL Injection3 documents3 sources
Severity
8.8HIGH
EPSS
4.3%
top 11.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19

Description

The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5unknown/supportcandy< 3.1.7

🔴Vulnerability Details

2
GHSA
GHSA-28fg-r93m-m726: The SupportCandy WordPress plugin before 32023-06-19
CVEList
SupportCandy < 3.1.7 - Subscriber+ SQLi2023-06-19
CVE-2023-2719 (HIGH CVSS 8.8) | The SupportCandy WordPress plugin b | cvebase.io