{"api_version":"1","generated_at":"2026-05-13T22:59:43+00:00","cve":"CVE-2022-3243","urls":{"html":"https://cve.report/CVE-2022-3243","api":"https://cve.report/api/cve/CVE-2022-3243.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3243","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3243"},"summary":{"title":"CVE-2022-3243","description":"The Import all XML, CSV & TXT WordPress plugin before 6.5.8 does not properly sanitise and escape imported data before using them back SQL statements, leading to SQL injection exploitable by high privilege users such as admin","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-10-17 12:15:00","updated_at":"2023-06-07 15:06:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a","name":"https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a","refsource":"MISC","tags":[],"title":"Import all XML, CSV & TXT into WordPress < 6.5.8 - Admin+ SQLi WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3243","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3243","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Sanjay Das","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"3243","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"smackcoders","cpe5":"an_ultimate_wordpress_importer_cum_migration_as_csv_\\&_xml","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3243","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"smackcoders","cpe5":"import_all_pages\\,_post_types\\,_products\\,_orders\\,_and_users_as_xml_\\&_csv","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"wordpress","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-3243","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Import all XML, CSV & TXT into WordPress < 6.5.8 - Admin+ SQLi"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Import all XML, CSV & TXT into WordPress","version":{"version_data":[{"version_affected":"<","version_name":"6.5.8","version_value":"6.5.8"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Import all XML, CSV & TXT WordPress plugin before 6.5.8 does not properly sanitise and escape imported data before using them back SQL statements, leading to SQL injection exploitable by high privilege users such as admin"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a","name":"https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-89 SQL Injection","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Sanjay Das"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-10-17 12:15:00","lastModifiedDate":"2023-06-07 15:06:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:smackcoders:import_all_pages\\,_post_types\\,_products\\,_orders\\,_and_users_as_xml_\\&_csv:*:*:*:*:wordpress:*:*:*","versionEndExcluding":"6.5.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}