CVE-2024-3265

The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters appended to an SQL query, making it possible for users with the administrator role to conduct SQL Injection attacks in the context of a multisite WordPress configurations.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:advance_search_project:advance_search:*:*:*:*:*:wordpress:*:*

History

08 May 2025, 19:14

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ - () https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/ - Exploit, Third Party Advisory
CWE CWE-89
First Time Advance Search Project
Advance Search Project advance Search
CPE cpe:2.3:a:advance_search_project:advance_search:*:*:*:*:*:wordpress:*:*

25 Apr 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 22:15

Updated : 2025-05-08 19:14


NVD link : CVE-2024-3265

Mitre link : CVE-2024-3265


JSON object : View

Products Affected

advance_search_project

  • advance_search
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')