Vulnerability Description
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iqonic | Kivicare | < 2.3.9 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30ExploitThird Party Advisory
- https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30ExploitThird Party Advisory
FAQ
What is CVE-2022-0786?
CVE-2022-0786 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to ...
How severe is CVE-2022-0786?
CVE-2022-0786 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0786?
Check the references section above for vendor advisories and patch information. Affected products include: Iqonic Kivicare.