.. / CVE-2022-0760

Exploit for WordPress Simple Link Directory <7.7.2 - SQL injection (CVE-2022-0760)

Description:

WordPress Simple Link Directory plugin before 7.7.2 contains a SQL injection vulnerability. The plugin does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action, available to unauthenticated and authenticated users. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

Nuclei Template

View the template here CVE-2022-0760.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-0760.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210
https://nvd.nist.gov/vuln/detail/CVE-2022-0760
https://plugins.trac.wordpress.org/changeset/2684915
https://wordpress.org/plugins/simple-link-directory/