Vulnerability Description
The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Semadatacoop | Sema Api | < 4.02 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03fExploitThird Party Advisory
- https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03fExploitThird Party Advisory
FAQ
What is CVE-2022-0836?
CVE-2022-0836 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthe...
How severe is CVE-2022-0836?
CVE-2022-0836 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0836?
Check the references section above for vendor advisories and patch information. Affected products include: Semadatacoop Sema Api.