{"api_version":"1","generated_at":"2026-04-11T19:28:24+00:00","cve":"CVE-2022-2559","urls":{"html":"https://cve.report/CVE-2022-2559","api":"https://cve.report/api/cve/CVE-2022-2559.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2559","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2559"},"summary":{"title":"CVE-2022-2559","description":"The Fluent Support WordPress plugin before 1.5.8 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-08-29 18:15:00","updated_at":"2022-09-01 06:47:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec","name":"https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec","refsource":"MISC","tags":[],"title":"Fluent Support < 1.5.8 - Admin+ SQLi WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2559","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2559","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Rafshanzani Suhada","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2559","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpmanageninja","cpe5":"fluent_support","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2559","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Fluent Support < 1.5.8 - Admin+ SQLi"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Fluent Support – WordPress Helpdesk and Customer Support Ticket Plugin","version":{"version_data":[{"version_affected":"<","version_name":"1.5.8","version_value":"1.5.8"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Fluent Support WordPress plugin before 1.5.8 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec","name":"https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-89 SQL Injection","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Rafshanzani Suhada"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-08-29 18:15:00","lastModifiedDate":"2022-09-01 06:47:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wpmanageninja:fluent_support:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.5.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}