Vulnerability Description
The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capability (by default admins), leading to an SQL injection
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpwhitesecurity | Website File Changes Monitor | < 1.8.3 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65ExploitThird Party Advisory
- https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65ExploitThird Party Advisory
FAQ
What is CVE-2022-2269?
CVE-2022-2269 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capab...
How severe is CVE-2022-2269?
CVE-2022-2269 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-2269?
Check the references section above for vendor advisories and patch information. Affected products include: Wpwhitesecurity Website File Changes Monitor.