- Description
- The WP Docs plugin for WordPress is vulnerable to time-based SQL Injection via the 'dir_id' parameter in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The vulnerability was partially patched in version 2.2.0.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-89
- Hype score
- Not currently trending
CVE-2024-12635 Time-Based SQL Injection Vulnerability in WP Docs Plugin Up to 2.2.0 The WP Docs plugin for WordPress has a time-based SQL Injection vulnerability. This happens through the 'dir_id' parameter in al... https://t.co/6LtkNIQFF1
@VulmonFeeds
21 Dec 2024
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12635 The WP Docs plugin for WordPress is vulnerable to time-based SQL Injection via the 'dir_id' parameter in all versions up to, and including, 2.2.0 due to insufficient … https://t.co/LYqusUwJfE
@CVEnew
21 Dec 2024
489 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes