Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-3768— WPSmartContracts < 1.3.12 - Author+ SQLi

EPSS 60.56% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-3768

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
WPSmartContracts < 1.3.12 - Author+ SQLi
Source: NVD (National Vulnerability Database)
Vulnerability Description
The WPSmartContracts WordPress plugin before 1.3.12 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin WPSmartContracts SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WPSmartContracts 1.3.12之前版本存在安全漏洞,该漏洞源于在SQL语句中使用参数之前未正确清理和转义参数,导致低权限用户可利用SQL注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownWPSmartContracts 0 ~ 1.3.12 -

II. Public POCs for CVE-2022-3768

#POC DescriptionSource LinkShenlong Link
1WordPress WPSmartContracts plugin before 1.3.12 contains a SQL injection vulnerability. The plugin does not properly sanitize and escape a parameter before using it in a SQL statement. An attacker with a role as low as author can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-3768.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-3768

登录查看更多情报信息。

Same Patch Batch · Unknown · 2022-11-28 · 24 CVEs total

CVE-2022-3849WP User Merger < 1.5.3 - Admin+ SQLi via user_id
CVE-2022-3601Image Hover Effects Css3 <= 4.5 - Admin+ Stored XSS
CVE-2022-3769OWM Weather < 5.6.9 - Contributor+ SQLi
CVE-2021-25059Download Plugin < 2.0.0 - Subscriber+ Website Download
CVE-2022-3689HTML Forms < 1.3.25 - Admin+ SQLi
CVE-2022-3831reCAPTCHA <= 1.6 - Admin+ Stored XSS
CVE-2022-3850Find and Replace All <= 1.3 - Arbitrary Replacement via CSRF
CVE-2022-3610Jeeng Push Notifications < 2.0.4 - Admin+ Stored Cross-Site Scripting
CVE-2022-2983Salat Times < 3.2.2 - Admin+ Stored Cross-Site Scripting
CVE-2022-2311Find and Replace All < 1.3 - Reflected Cross Site Scripting
CVE-2022-3828Video Thumbnails <= 2.12.3 - Admin+ Stored XSS
CVE-2022-3490Checkout Field Editor for WooCommerce < 1.8.0 - Admin+ PHP Object Injection
CVE-2022-3847Showing URL in QR Code <= 0.0.1 - Stored XSS via CSRF
CVE-2022-3824WP Admin UI Customize < 1.5.13 - Admin+ Stored XSS
CVE-2022-3833Fancier Author Box by ThematoSoup <= 1.4 - Admin+ Stored XSS
CVE-2022-3848WP User Merger < 1.5.3 - Admin+ SQLi via wpsu_user_id
CVE-2022-3822Donations via PayPal < 1.9.9 - Admin+ Stored XSS
CVE-2022-3834Google Forms <= 0.95 - Admin+ Stored XSS
CVE-2022-3603Export customers list CSV for WooCommerce < 2.0.69 - CSV Injection
CVE-2022-3839Analytics for WP <= 1.5.1 - Admin+ Stored XSS

Showing top 20 of 24 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-3768

No comments yet


Leave a comment