Vulnerability Description
The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/editing events, which could allow users with a role as low as contributor to perform SQL Injection attacks
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mage-People | Event Manager And Tickets Selling For Woocommerce | < 3.5.8 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2671860PatchThird Party Advisory
- https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431fExploitPatchThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2671860PatchThird Party Advisory
- https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431fExploitPatchThird Party Advisory
FAQ
What is CVE-2022-0478?
CVE-2022-0478 is a vulnerability with a CVSS score of 8.8 (HIGH). The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/ed...
How severe is CVE-2022-0478?
CVE-2022-0478 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0478?
Check the references section above for vendor advisories and patch information. Affected products include: Mage-People Event Manager And Tickets Selling For Woocommerce.