2 results (0.002 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 1

The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks El plugin TI WooCommerce Wishlist de WordPress versiones anteriores a 1.40.1, el plugin TI WooCommerce Wishlist Pro de WordPress versiones anteriores a 1.40.1 no sanean y escapan el parámetro item_id antes de usarlo en una sentencia SQL por medio del endpoint REST wishlist/remove_product, permitiendo a atacantes no autenticados llevar a cabo ataques de inyección SQL • https://plugins.trac.wordpress.org/changeset/2668899 https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the 'ti-woocommerce-wishlist/includes/export.class.php' file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings. • https://blog.nintechnet.com/critical-zero-day-vulnerability-fixed-in-wordpress-ti-woocommerce-wishlist-plugin https://templateinvaders.com/changelogs/ti-woocommerce-wishlist-plugin-changelog https://wpscan.com/vulnerability/2e2fb815-7cca-4e6c-b466-179337fe99ee https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=cve • CWE-862: Missing Authorization •