First published: Mon Mar 21 2022(Updated: )
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SourceCodester Simple Subscription Website | =1.0 | |
Simple Subscription Project | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26283 is classified as a high-severity vulnerability due to its potential for SQL injection and database exposure.
To fix CVE-2022-26283, validate and sanitize the input parameters in the view_plan endpoint to prevent SQL injection.
CVE-2022-26283 affects Simple Subscription Website version 1.0.
Yes, CVE-2022-26283 can allow attackers to dump the application's database, potentially leading to data loss.
As of now, there is no official patch for CVE-2022-26283; implementing input validation is critical for mitigation.