Vulnerability Description
The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enl Newsletter Plugin Project | Enl-Newsletter | <= 1.0.1 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ExploitThird Party Advisory
FAQ
What is CVE-2024-3060?
CVE-2024-3060 is a vulnerability with a CVSS score of 4.5 (MEDIUM). The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
How severe is CVE-2024-3060?
CVE-2024-3060 has been rated MEDIUM with a CVSS base score of 4.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3060?
Check the references section above for vendor advisories and patch information. Affected products include: Enl Newsletter Plugin Project Enl-Newsletter.