WordPress Checkout Mestres WP Plugin <= 7.1.9.6 is vulnerable to SQL Injection
CVE-2023-51469

9.3CRITICAL

Key Information:

Vendor
WordPress
Vendor
CVE Published:
31 December 2023

Summary

An SQL Injection vulnerability has been identified in the Checkout Mestres WP plugin developed by Mestres. This vulnerability allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data and other malicious actions. Sites utilizing versions from n/a to 7.1.9.6 are at risk. It is crucial for WordPress users to ensure that they are running the latest version of the plugin to mitigate this risk. Regular updates and security audits are recommended for all websites to maintain robust defenses against SQL Injection attacks.

Affected Version(s)

Checkout Mestres WP <= 7.1.9.6

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rafie Muhammad (Patchstack)
.