CVE-2022-4117

The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iws-geo-form-fields_project:iws-geo-form-fields:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193 - Exploit, Third Party Advisory

07 Nov 2023, 03:56

Type Values Removed Values Added
CWE CWE-89

Information

Published : 2022-12-26 13:15

Updated : 2025-04-14 15:15


NVD link : CVE-2022-4117

Mitre link : CVE-2022-4117

CVE.ORG link : CVE-2022-4117


JSON object : View

Products Affected

iws-geo-form-fields_project

  • iws-geo-form-fields
CWE

No CWE.