Vulnerability Details CVE-2023-6373
The ArtPlacer Widget WordPress plugin before 2.20.7 does not sanitize and escape the "id" parameter before submitting the query, leading to a SQLI exploitable by editors and above. Note: Due to the lack of CSRF check, the issue could also be exploited via a CSRF against a logged editor (or above)
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 66.2%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-6373
-
cpe:2.3:a:artplacer:artplacer_widget:1.0
-
cpe:2.3:a:artplacer:artplacer_widget:1.4
-
cpe:2.3:a:artplacer:artplacer_widget:1.4.7
-
cpe:2.3:a:artplacer:artplacer_widget:1.7.7
-
cpe:2.3:a:artplacer:artplacer_widget:1.8.33
-
cpe:2.3:a:artplacer:artplacer_widget:2
-
cpe:2.3:a:artplacer:artplacer_widget:2.20
-
cpe:2.3:a:artplacer:artplacer_widget:2.20.4
-
cpe:2.3:a:artplacer:artplacer_widget:2.20.6