Vulnerability Description
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Devbunch | Master Elements | <= 8.0 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643ExploitThird Party Advisory
- https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643ExploitThird Party Advisory
FAQ
What is CVE-2022-0693?
CVE-2022-0693 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated ...
How severe is CVE-2022-0693?
CVE-2022-0693 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0693?
Check the references section above for vendor advisories and patch information. Affected products include: Devbunch Master Elements.