Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-3689 PoC — HTML Forms < 1.3.25 - Admin+ SQLi

Source
Associated Vulnerability
Title:HTML Forms < 1.3.25 - Admin+ SQLi (CVE-2022-3689)
Description:The HTML Forms WordPress plugin before 1.3.25 does not properly properly escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users
Description
CVE-2022-3689
Readme
# CVE-2022-3689 분석 보고서

## 개요

CVE-2022-3689는 WordPress의 특정 플러그인에서 발견된 SQL 인젝션 취약점으로, 공격자가 웹 애플리케이션의 보안 취약점을 이용하여 데이터베이스에 악의적인 SQL 코드를 삽입할 수 있습니다. 이로 인해 데이터 유출, 데이터 변조 등의 심각한 보안 문제가 발생할 수 있습니다.

## 참고 자료

- [이글루코퍼레이션 보안 보고서](https://www.igloo.co.kr/search/AI/)
File Snapshot

[4.0K] /data/pocs/32237175f00516c648482bfd6dfd6cd6b9a1e167 └── [ 503] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →