{"api_version":"1","generated_at":"2026-04-28T19:50:05+00:00","cve":"CVE-2022-2754","urls":{"html":"https://cve.report/CVE-2022-2754","api":"https://cve.report/api/cve/CVE-2022-2754.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2754","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2754"},"summary":{"title":"CVE-2022-2754","description":"The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not validate and escape some reservation parameters before using them in SQL statements, which could allow unauthenticated attackers to perform SQL Injection attacks","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-09-19 14:15:00","updated_at":"2022-09-21 06:28:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5","name":"https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5","refsource":"MISC","tags":[],"title":"Ketchup Restaurant Reservations <= 1.0.0 - Unauthenticated Blind SQLi WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2754","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2754","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Bastijn Ouwendijk","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2754","vulnerable":"1","versionEndIncluding":"1.0.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ketchup_restaurant_reservations_project","cpe5":"ketchup_restaurant_reservations","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2754","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Ketchup Restaurant Reservations <= 1.0.0 - Unauthenticated Blind SQLi"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Ketchup Restaurant Reservations","version":{"version_data":[{"version_affected":"<=","version_name":"1.0.0","version_value":"1.0.0"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not validate and escape some reservation parameters before using them in SQL statements, which could allow unauthenticated attackers to perform SQL Injection attacks"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5","name":"https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-89 SQL Injection","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Bastijn Ouwendijk"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-09-19 14:15:00","lastModifiedDate":"2022-09-21 06:28:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ketchup_restaurant_reservations_project:ketchup_restaurant_reservations:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.0.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}