Vulnerability Description
Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eventespresso | Event Espresso | 3.1.37.11.l |
Related Weaknesses (CWE)
References
- http://www.vapidlabs.com/advisory.php?v=197ExploitPatchThird Party Advisory
- https://wordpress.org/plugins/event-espresso-free/ProductThird Party Advisory
- http://www.vapidlabs.com/advisory.php?v=197ExploitPatchThird Party Advisory
- https://wordpress.org/plugins/event-espresso-free/ProductThird Party Advisory
FAQ
What is CVE-2017-1002026?
CVE-2017-1002026 is a vulnerability with a CVSS score of 8.8 (HIGH). Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement...
How severe is CVE-2017-1002026?
CVE-2017-1002026 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1002026?
Check the references section above for vendor advisories and patch information. Affected products include: Eventespresso Event Espresso.