CVE-2022-4547

high

Description

The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.

References

https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99

https://bulletin.iese.de/post/conditional-payment-methods-for-woocommerce_1-0/

Details

Source: Mitre, NVD

Published: 2023-01-16

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: High