{ "schema_version": "1.4.0", "id": "GHSA-hgrv-3cp5-97qg", "modified": "2022-03-17T00:02:58Z", "published": "2022-03-08T00:00:29Z", "aliases": [ "CVE-2022-0410" ], "details": "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.6 does not sanitise and escape the id parameter before using it in a SQL statement via the refUrlDetails AJAX action, available to any authenticated user, leading to a SQL injection", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0410" }, { "type": "WEB", "url": "https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-03-07T09:15:00Z" } }