CVE-2022-2559
Summary
| CVE | CVE-2022-2559 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-29 18:15:00 UTC |
| Updated | 2022-09-01 06:47:00 UTC |
| Description | The Fluent Support WordPress plugin before 1.5.8 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Wpmanageninja | Fluent Support | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fluent Support < 1.5.8 - Admin+ SQLi WordPress Security Vulnerability | MISC | wpscan.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Rafshanzani Suhada
There are currently no legacy QID mappings associated with this CVE.