3 results (0.007 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PayPlus LTD PayPlus Payment Gateway.This issue affects PayPlus Payment Gateway: from n/a through 7.0.7. The PayPlus Payment Gateway plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 7.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://patchstack.com/database/vulnerability/payplus-payment-gateway/wordpress-payplus-payment-gateway-plugin-7-0-7-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PayPlus LTD PayPlus Payment Gateway allows Reflected XSS.This issue affects PayPlus Payment Gateway: from n/a through 6.6.8. Vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web (XSS o 'Cross-site Scripting') en PayPlus LTD PayPlus Payment Gateway permite XSS reflejado. Este problema afecta a PayPlus Payment Gateway: desde n/a hasta 6.6.8. The PayPlus Payment Gateway plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 6.6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/payplus-payment-gateway/wordpress-payplus-payment-gateway-plugin-6-6-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 2

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability. El complemento PayPlus Payment Gateway de WordPress anterior a 6.6.9 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL a través de una ruta API de WooCommerce disponible para usuarios no autenticados, lo que genera una vulnerabilidad de inyección SQL. The PayPlus Payment Gateway plugin for WordPress is vulnerable SQL Injection in all versions up to, and including, 6.6.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. WordPress PayPlus Payment Gateway plugin versions prior to 6.6.9 suffer from a remote SQL injection vulnerability. • https://github.com/j3r1ch0123/CVE-2024-6205 https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •