WordPress Subscribe to Category Plugin <= 2.7.4 is vulnerable to SQL Injection
CVE-2023-38382
9.8CRITICAL
Summary
An SQL Injection vulnerability exists in the Subscribe to Category plugin, developed by Daniel Söderström and Sidney van de Stouwe. This flaw allows attackers to manipulate SQL queries by injecting malicious code into the application, potentially compromising the database. The vulnerability impacts all versions from n/a up to 2.7.4, posing a significant risk to users who have not updated to patched versions. It is crucial for users to implement security measures and ensure that their plugins are up to date to protect against exploitation.
Affected Version(s)
Subscribe to Category <= 2.7.4
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mika (Patchstack Alliance)