Blind SQL Injection Vulnerability in TagDiv's Opt-In Builder Plugin
CVE-2023-3416
7.2HIGH
Key Information
- Vendor
- Tagdiv
- Status
- Tagdiv Opt-in Builder
- Vendor
- CVE Published:
- 17 August 2024
Summary
The tagDiv Opt-In Builder plugin is vulnerable to Blind SQL Injection via the 'subscriptionCouponId' parameter via the 'create_stripe_subscription' REST API endpoint in versions up to, and including, 1.4.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected Version(s)
tagDiv Opt-In Builder <= 1.4.4
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Truoc Phan