Vulnerability Description
participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xnau | Participants Database | <= 1.9.5.5 |
Related Weaknesses (CWE)
References
- https://blog.impenetrable.tech/cve-2020-8596Third Party Advisory
- https://wpvulndb.com/vulnerabilities/10068Third Party Advisory
- https://blog.impenetrable.tech/cve-2020-8596Third Party Advisory
- https://wpvulndb.com/vulnerabilities/10068Third Party Advisory
FAQ
What is CVE-2020-8596?
CVE-2020-8596 is a vulnerability with a CVSS score of 7.5 (HIGH). participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy par...
How severe is CVE-2020-8596?
CVE-2020-8596 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8596?
Check the references section above for vendor advisories and patch information. Affected products include: Xnau Participants Database.