WordPress Checkout Mestres WP Plugin <= 7.1.9.6 is vulnerable to SQL Injection
CVE-2023-51469
What is CVE-2023-51469?
An SQL Injection vulnerability has been identified in the Checkout Mestres WP plugin developed by Mestres. This vulnerability allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data and other malicious actions. Sites utilizing versions from n/a to 7.1.9.6 are at risk. It is crucial for WordPress users to ensure that they are running the latest version of the plugin to mitigate this risk. Regular updates and security audits are recommended for all websites to maintain robust defenses against SQL Injection attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Checkout Mestres WP <= 7.1.9.6
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved