Groundhogg Contacts < 2.7.9.4 - Admin+ SQLi
CVE-2023-1425
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 10 April 2023
Badges
Summary
The Groundhogg WordPress plugin version prior to 2.7.9.4 has a critical vulnerability where it fails to properly sanitize and escape user-supplied data in SQL statements. This insufficiency allows high-privilege users, such as administrators, to exploit the application. If successfully executed, an attacker could manipulate database queries leading to unauthorized data access and alterations.
Affected Version(s)
WordPress CRM, Email & Marketing Automation for WordPress | Award Winner β Groundhogg 0 < 2.7.9.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved