← Zuruck zu CVEs
CVE-2022-1768
CRITICAL9.8
Beschreibung
The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2. Please note that this is separate from CVE-2022-1453 & CVE-2022-1505.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/13/2022
Zuletzt geandert4/8/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
carrcommunications:rsvpmaker
Schwachen (CWE)
CWE-89
Referenzen
https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2725322%40rsvpmaker&new=2725322%40rsvpmaker&sfp_email=&sfph_mail=(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d02646-271a-4079-8a47-00b4029e9c1f?source=cve(security@wordfence.com)
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1768(security@wordfence.com)
http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2725322%40rsvpmaker&new=2725322%40rsvpmaker&sfp_email=&sfph_mail=(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d02646-271a-4079-8a47-00b4029e9c1f?source=cve(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1768(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.