PayPlus Payment Gateway vulnerable to SQL Injection
CVE-2024-37564

8.5HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
12 July 2024

Summary

The vulnerability in the PayPlus Payment Gateway arises from improper neutralization of special elements utilized in SQL commands, commonly known as SQL Injection. This security issue poses a significant risk as it may allow attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data or system compromise. Affected versions of the PayPlus Payment Gateway, particularly those up to version 7.0.7, are subject to this vulnerability, necessitating prompt mitigation strategies.

Affected Version(s)

PayPlus Payment Gateway <= 7.0.7

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

LVT-tholv2k (Patchstack Alliance)
.