Groundhogg Contacts < 2.7.9.4 - Admin+ SQLi
CVE-2023-1425
What is CVE-2023-1425?
The Groundhogg WordPress plugin version prior to 2.7.9.4 has a critical vulnerability where it fails to properly sanitize and escape user-supplied data in SQL statements. This insufficiency allows high-privilege users, such as administrators, to exploit the application. If successfully executed, an attacker could manipulate database queries leading to unauthorized data access and alterations.
Affected Version(s)
WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg 0 < 2.7.9.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved