CVE-2024-6205

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:payplus:payplus_payment_gateway:*:*:*:*:*:wordpress:*:*

History

19 Jul 2024, 20:23

Type Values Removed Values Added
CPE cpe:2.3:a:payplus:payplus_payment_gateway:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087/ - () https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087/ - Exploit, Third Party Advisory
CWE CWE-89
First Time Payplus payplus Payment Gateway
Payplus
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

19 Jul 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 06:15

Updated : 2024-08-01 14:00


NVD link : CVE-2024-6205

Mitre link : CVE-2024-6205


JSON object : View

Products Affected

payplus

  • payplus_payment_gateway
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')