Blind SQL Injection Vulnerability in TagDiv's Opt-In Builder Plugin
CVE-2023-3416
7.2HIGH
Key Information:
- Vendor
- Tagdiv
- Status
- Tagdiv Opt-in Builder
- Vendor
- CVE Published:
- 17 August 2024
Summary
The tagDiv Opt-In Builder plugin has a vulnerability that allows blind SQL injection through the 'subscriptionCouponId' parameter in the 'create_stripe_subscription' REST API endpoint. This weakness arises from insufficient escaping of user input and inadequate preparation of SQL queries. Authenticated attackers possessing administrator privileges can append malicious SQL commands to existing queries, which may lead to unauthorized access and extraction of sensitive information from the database. The vulnerability affects all versions up to and including 1.4.4, highlighting a significant security concern for users relying on this plugin.
Affected Version(s)
tagDiv Opt-In Builder * <= 1.4.4
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Truoc Phan