First published: Mon Mar 21 2022(Updated: )
The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quantumcloud Simple Link Directory | <7.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0760 is a vulnerability in the Simple Link Directory WordPress plugin before version 7.7.2.
CVE-2022-0760 allows unauthenticated and authenticated users to perform an SQL injection attack by exploiting the qcopd_upvote_action AJAX action.
CVE-2022-0760 has a severity rating of 9.8 (Critical).
To fix CVE-2022-0760, upgrade to version 7.7.2 or later of the Simple Link Directory plugin.
More information about CVE-2022-0760 can be found at the following references: - [https://plugins.trac.wordpress.org/changeset/2684915](https://plugins.trac.wordpress.org/changeset/2684915) - [https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210](https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210)