CVE-2022-0846
28.03.2022, 18:15
The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users
Vendor | Product | Version |
---|---|---|
speakout\!_email_petitions_project | speakout\!_email_petitions | 𝑥 < 2.14.15.1 |
𝑥
= Vulnerable software versions