WP Custom Cursors < 3.2 - Admin+ SQLi
CVE-2023-2221
7.2HIGH
Summary
The WP Custom Cursors WordPress plugin, prior to version 3.2, fails to properly sanitize and escape parameters before including them in SQL queries. This oversight permits SQL injection attacks, which malicious users with administrative privileges can exploit to manipulate the database, potentially gaining unauthorized access to sensitive data or performing unauthorized actions.
Affected Version(s)
WP Custom Cursors | WordPress Cursor Plugin 0 < 3.2
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Chien Vuong
WPScan