The Fluent Support WordPress plugin before 1.5.8 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T00:39:08.111Z
Reserved: 2022-07-27T00:00:00
Link: CVE-2022-2559

No data.

Status : Modified
Published: 2022-08-29T18:15:09.637
Modified: 2024-11-21T07:01:15.003
Link: CVE-2022-2559

No data.