- Description
- The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations.
- Source
- contact@wpscan.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 4.1
- Impact score
- 1.4
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-89
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:updraftplus:wp-optimize:*:*:*:*:*:wordpress:*:*",
"vulnerable": true,
"matchCriteriaId": "45E389B8-30C4-44E1-A722-D6C929D714D5",
"versionEndExcluding": "4.2.0"
}
],
"operator": "OR"
}
]
}
]