First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Matrimonial Project | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-46794 is critical with a CVSS score of 9.8.
CVE-2023-46794 affects Online Matrimonial Project v1.0 by allowing multiple unauthenticated SQL Injection vulnerabilities.
The 'register()' function in functions.php of Online Matrimonial Project v1.0 is vulnerable to unauthenticated SQL injections.
The Common Weakness Enumeration (CWE) ID for CVE-2023-46794 is CWE-89.
To fix the multiple unauthenticated SQL Injection vulnerabilities in Online Matrimonial Project v1.0, you should validate and filter the 'email' parameter in the 'register()' function of the functions.php resource before sending them to the database.