Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| WP Statistics | WP Statistics | 13.1.5 ~ 13.1.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-25148.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-0651 | 9.8 CRITICAL | WP Statistics <= 13.1.5 Unauthenticated Blind SQL Injection via current_page_type |
| CVE-2022-25149 | 9.8 CRITICAL | WP Statistics <= 13.1.5 Unauthenticated Blind SQL Injection via IP |
| CVE-2022-25305 | 7.2 HIGH | WP Statistics <= 13.1.5 Unauthenticated Stored Cross-Site Scripting via IP |
| CVE-2022-25306 | 7.2 HIGH | WP Statistics <= 13.1.5 Unauthenticated Stored Cross-Site Scripting via browser |
| CVE-2022-25307 | 7.2 HIGH | WP Statistics <= 13.1.5 Unauthenticated Stored Cross-Site Scripting via platform |
No comments yet