{"api_version":"1","generated_at":"2026-04-10T14:29:48+00:00","cve":"CVE-2022-3720","urls":{"html":"https://cve.report/CVE-2022-3720","api":"https://cve.report/api/cve/CVE-2022-3720.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3720","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3720"},"summary":{"title":"CVE-2022-3720","description":"The Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-11-21 11:15:00","updated_at":"2023-11-07 03:51:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5","name":"https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5","refsource":"CONFIRM","tags":[],"title":"Event Monster < 1.2.1 - Admin+ SQLi WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3720","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3720","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3720","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"awplife","cpe5":"event_monster","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-3720","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Event Monster","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5","refsource":"MISC","name":"https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Thura Moe Myint"}]},"nvd":{"publishedDate":"2022-11-21 11:15:00","lastModifiedDate":"2023-11-07 03:51:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:awplife:event_monster:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}