WordPress Subscribe to Category Plugin <= 2.7.4 is vulnerable to SQL Injection
CVE-2023-32590
Key Information:
- Vendor
- WordPress
- Status
- Vendor
- CVE Published:
- 20 December 2023
Badges
Summary
The Subscribe to Category plugin, developed by Daniel Söderström and Sidney van de Stouwe, contains a security vulnerability that permits improper neutralization of special elements used in SQL commands. This flaw enables attackers to exploit SQL Injection techniques, potentially allowing unauthorized access to sensitive data. It is critical for users of Subscribe to Category, versions n/a through 2.7.4, to apply available patches to safeguard their WordPress environments against exploitation.
Affected Version(s)
Subscribe to Category <= 2.7.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved