CVE-2022-3856

The Comic Book Management System WordPress plugin before 2.2.0 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inksplat:comic_book_management_system:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ - Broken Link () https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/ - Broken Link
References () https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192 - Exploit, Third Party Advisory

07 Nov 2023, 03:51

Type Values Removed Values Added
CWE CWE-89

Information

Published : 2022-12-05 17:15

Updated : 2025-04-24 14:15


NVD link : CVE-2022-3856

Mitre link : CVE-2022-3856

CVE.ORG link : CVE-2022-3856


JSON object : View

Products Affected

inksplat

  • comic_book_management_system
CWE

No CWE.