CVE-2024-1068

The 404 Solution WordPress plugin before 2.35.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ajexperience:404_solution:*:*:*:*:*:wordpress:*:*

History

01 May 2025, 00:04

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ - () https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:ajexperience:404_solution:*:*:*:*:*:wordpress:*:*
CWE CWE-89
First Time Ajexperience
Ajexperience 404 Solution

21 Nov 2024, 08:49

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ - () https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/ -

26 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

11 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-11 18:15

Updated : 2025-05-01 00:04


NVD link : CVE-2024-1068

Mitre link : CVE-2024-1068

CVE.ORG link : CVE-2024-1068


JSON object : View

Products Affected

ajexperience

  • 404_solution
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')