{"api_version":"1","generated_at":"2026-04-23T15:10:15+00:00","cve":"CVE-2022-2840","urls":{"html":"https://cve.report/CVE-2022-2840","api":"https://cve.report/api/cve/CVE-2022-2840.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2840","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2840"},"summary":{"title":"CVE-2022-2840","description":"The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-09-19 14:15:00","updated_at":"2022-12-03 02:40:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html","name":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html","refsource":"MISC","tags":[],"title":"WordPress Zephyr Project Manager 3.2.42 SQL Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c","name":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c","refsource":"MISC","tags":[],"title":"Zephyr Project Manager < 3.2.5 - Multiple Unauthenticated SQLi WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2840","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2840","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Rizacan TUFAN","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2840","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zephyr_project_manager_project","cpe5":"zephyr_project_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2840","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Zephyr Project Manager < 3.2.5 - Multiple Unauthenticated SQLi"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Zephyr Project Manager","version":{"version_data":[{"version_affected":"<","version_name":"3.2.5","version_value":"3.2.5"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c","name":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html","url":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-89 SQL Injection","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Rizacan TUFAN"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-09-19 14:15:00","lastModifiedDate":"2022-12-03 02:40:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:zephyr_project_manager_project:zephyr_project_manager:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.2.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}