First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'pass' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Matrimonial Project | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46798
Online Matrimonial Project v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Projectworlds Online Matrimonial Project v1.0
Critical
CWE-89
Apply the patch provided by the vendor or upgrade to a version that addresses this issue.