First published: Tue Jun 27 2023(Updated: )
The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wedevs Wp Erp | <1.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2744.
The severity of CVE-2023-2744 is high.
The affected software is the ERP WordPress plugin before version 1.12.4.
This vulnerability can be exploited by high privilege users, such as admin, through a SQL injection in the `type` parameter of the `erp/v1/accounting/v1/people` REST API endpoint.
Yes, the fix for CVE-2023-2744 is to update the ERP WordPress plugin to version 1.12.4 or later.