CVE-2024-3060

The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 18:05

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - () https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ - Exploit, Third Party Advisory
First Time Enl Newsletter Plugin Project
Enl Newsletter Plugin Project enl-newsletter
CPE cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

26 Apr 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-26 05:15

Updated : 2025-05-07 18:05


NVD link : CVE-2024-3060

Mitre link : CVE-2024-3060


JSON object : View

Products Affected

enl_newsletter_plugin_project

  • enl-newsletter
CWE

No CWE.