Vulnerability Description
The Realty Workstation WordPress plugin before 1.0.15 does not sanitise and escape the trans_edit parameter before using it in a SQL statement when an agent edit a transaction, leading to an SQL injection
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtyworkstation | Realty Workstation | < 1.0.15 |
Related Weaknesses (CWE)
References
- https://bulletin.iese.de/post/realty-workstation_1-0-6ExploitThird Party Advisory
- https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049ExploitThird Party Advisory
- https://bulletin.iese.de/post/realty-workstation_1-0-6ExploitThird Party Advisory
- https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049ExploitThird Party Advisory
FAQ
What is CVE-2022-1691?
CVE-2022-1691 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The Realty Workstation WordPress plugin before 1.0.15 does not sanitise and escape the trans_edit parameter before using it in a SQL statement when an agent edit a transaction, leading to an SQL injec...
How severe is CVE-2022-1691?
CVE-2022-1691 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1691?
Check the references section above for vendor advisories and patch information. Affected products include: Realtyworkstation Realty Workstation.