SQL Injection Vulnerability in Intuitive Custom Post Order Plugin for WordPress
CVE-2023-1016
6.6MEDIUM
Summary
The Intuitive Custom Post Order plugin for WordPress has a vulnerability that allows authenticated attackers with administrator permissions to exploit SQL Injection. The flaw is due to inadequate escaping of user-supplied parameters, specifically 'objects' and 'tags', in conjunction with insufficiently prepared queries in the 'update_options' and 'refresh' functions. This exploitation can allow attackers to append malicious SQL queries, potentially revealing sensitive information stored in the database. This vulnerability poses a significant risk, especially in environments where characteristics like character sets can lead to query manipulation.
Affected Version(s)
Intuitive Custom Post Order * <= 3.1.3
References
CVSS V3.1
Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved