Vulnerability Description
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Letsrecover Project | Letsrecover | <= 1.1.0 |
References
- https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_1Broken LinkThird Party Advisory
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626Third Party Advisory
- https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_1Broken LinkThird Party Advisory
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626Third Party Advisory
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626/
FAQ
What is CVE-2022-4357?
CVE-2022-4357 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a S...
How severe is CVE-2022-4357?
CVE-2022-4357 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-4357?
Check the references section above for vendor advisories and patch information. Affected products include: Letsrecover Project Letsrecover.