CVE-2023-2492

QueryWall <= 1.1.1 - Authenticated (Administrator+) SQL Injection

highImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
7.2
CVSS Score
7.2
CVSS Score
high
Severity
Unpatched
Patched in
N/A
Time to patch

Description

The QueryWall plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.1.1 due to insufficient escaping on a user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
High
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions<=1.1.1
PublishedMay 26, 2023
Last updatedJanuary 22, 2024
Affected pluginquerywall

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.