WordPress Checkout Mestres WP Plugin <= 7.1.9.6 is vulnerable to SQL Injection
CVE-2023-51469
9.3CRITICAL
Summary
An SQL Injection vulnerability has been identified in the Checkout Mestres WP plugin developed by Mestres. This vulnerability allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data and other malicious actions. Sites utilizing versions from n/a to 7.1.9.6 are at risk. It is crucial for WordPress users to ensure that they are running the latest version of the plugin to mitigate this risk. Regular updates and security audits are recommended for all websites to maintain robust defenses against SQL Injection attacks.
Affected Version(s)
Checkout Mestres WP <= 7.1.9.6
References
CVSS V3.1
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Rafie Muhammad (Patchstack)