4.9
CVE-2023-2111
- EPSS 0.28%
- Veröffentlicht 30.05.2023 08:15:09
- Zuletzt bearbeitet 10.01.2025 17:15:11
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
HollerBox <= 2.1.3 - Authenticated (edit_popups+) SQL Injection
The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database.
Mögliche Gegenmaßnahme
HollerBox — Fast & Effective Popups & Lead-Generation: Update to version 2.1.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
HollerBox — Fast & Effective Popups & Lead-Generation
Version
[*, 2.1.4)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Groundhogg ≫ Hollerbox SwPlatformwordpress Version < 2.1.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.28% | 0.507 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|