CVE-2023-6030

The LogDash Activity Log WordPress plugin before 1.1.4 hooks the wp_login_failed function (from src/Hooks/Users.php) in order to log failed login attempts to the database but it doesn't escape the username when it perform some SQL request leading to a SQL injection vulnerability which can be exploited using time-based technique by unauthenticated attacker
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:a:deryckoe:logdash_activity_log:*:*:*:*:*:wordpress:*:*

History

11 Jun 2025, 19:24

Type Values Removed Values Added
CWE CWE-89
First Time Deryckoe
Deryckoe logdash Activity Log
CPE cpe:2.3:a:deryckoe:logdash_activity_log:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/b658e403-006c-4555-b1b2-3603e44f4411/ - () https://wpscan.com/vulnerability/b658e403-006c-4555-b1b2-3603e44f4411/ - Exploit, Third Party Advisory

15 May 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-15 20:15

Updated : 2025-06-11 19:24


NVD link : CVE-2023-6030

Mitre link : CVE-2023-6030


JSON object : View

Products Affected

deryckoe

  • logdash_activity_log
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')