Blind SQL Injection Vulnerability in tagDiv Opt-In Builder Plugin
CVE-2023-3419

7.2HIGH

Key Information:

Vendor
Tagdiv
Status
Tagdiv Opt-in Builder
Vendor
CVE Published:
17 August 2024

Summary

The tagDiv Opt-In Builder plugin is susceptible to a Blind SQL Injection vulnerability via the 'couponId' parameter of the 'recreate_stripe_subscription' REST API endpoint in versions up to and including 1.4.4. This vulnerability arises from inadequate user input escaping and insufficient preparation of the SQL query. Authenticated attackers with administrator privileges can exploit this weakness to inject additional SQL queries into existing queries, potentially exposing sensitive information from the underlying database. Maintaining secure coding practices and ensuring thorough input validation are crucial to mitigate such vulnerabilities.

Affected Version(s)

tagDiv Opt-In Builder * <= 1.4.4

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Truoc Phan
.