First published: Tue May 30 2023(Updated: )
The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Groundhogg Hollerbox | <2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2111 is medium with a severity value of 4.9.
CVE-2023-2111 affects the Fast & Effective Popups & Lead-Generation for WordPress plugin before version 2.1.4.
CVE-2023-2111 allows administrators in multi-site configuration to leak sensitive information from the site's database.
Yes, upgrading the Fast & Effective Popups & Lead-Generation for WordPress plugin to version 2.1.4 or higher fixes CVE-2023-2111.
The Common Weakness Enumeration (CWE) ID for CVE-2023-2111 is 89.