SQL Injection Vulnerability in DiveBook Plugin for WordPress
CVE-2020-14207
5.3MEDIUM
Summary
The DiveBook plugin version 1.1.4 for WordPress contains a vulnerability that allows SQL injection through the filter_diver
parameter in the divelog.php
file. This flaw permits unauthenticated attackers to execute malicious SQL queries, potentially leading to unauthorized access to sensitive database information. The vulnerability highlights the importance of sanitizing user input to safeguard web applications against such attacks.
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved