First published: Mon Mar 14 2022(Updated: )
The Simple Quotation WordPress plugin through 1.3.2 does not have authorisation (and CSRF) checks in various of its AJAX actions and is lacking escaping of user data when using it in SQL statements, allowing any authenticated users, such as subscriber to perform SQL injection attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sedlex Simple Quotation | <=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22735 has a medium severity rating due to its potential for SQL injection attacks.
To fix CVE-2022-22735, update the Simple Quotation plugin to version 1.3.3 or later.
Any authenticated user, including subscribers, can potentially exploit CVE-2022-22735 if they have access to the vulnerable plugin.
CVE-2022-22735 can lead to unauthorized SQL injection attacks, potentially exposing sensitive data.
Disabling or removing the Simple Quotation plugin can serve as a temporary workaround for CVE-2022-22735.