.. / CVE-2022-0846

Exploit for SpeakOut Email Petitions < 2.14.15.1 - SQL Injection (CVE-2022-0846)

Description:

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users.

Nuclei Template

View the template here CVE-2022-0846.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-0846.yaml
Copy

References:

https://wordpress.org/plugins/speakout/
https://github.com/ARPSyndicate/cvemon
https://nvd.nist.gov/vuln/detail/CVE-2022-0846
https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4
https://github.com/DharmaDoll/Search-Poc-from-CVE