Vulnerability Details CVE-2024-9879
The Melapress File Monitor WordPress plugin before 2.1.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.1%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2024-9879
-
cpe:2.3:a:melapress:melapress_file_monitor:1.0.0
-
cpe:2.3:a:melapress:melapress_file_monitor:1.1
-
cpe:2.3:a:melapress:melapress_file_monitor:1.2
-
cpe:2.3:a:melapress:melapress_file_monitor:1.3
-
cpe:2.3:a:melapress:melapress_file_monitor:1.4
-
cpe:2.3:a:melapress:melapress_file_monitor:1.4.1
-
cpe:2.3:a:melapress:melapress_file_monitor:1.5
-
cpe:2.3:a:melapress:melapress_file_monitor:1.6.0
-
cpe:2.3:a:melapress:melapress_file_monitor:1.6.1
-
cpe:2.3:a:melapress:melapress_file_monitor:1.6.2
-
cpe:2.3:a:melapress:melapress_file_monitor:1.7.1
-
cpe:2.3:a:melapress:melapress_file_monitor:1.7.2
-
cpe:2.3:a:melapress:melapress_file_monitor:1.8.1
-
cpe:2.3:a:melapress:melapress_file_monitor:1.8.2
-
cpe:2.3:a:melapress:melapress_file_monitor:1.8.3
-
cpe:2.3:a:melapress:melapress_file_monitor:1.8.4
-
cpe:2.3:a:melapress:melapress_file_monitor:1.8.5
-
cpe:2.3:a:melapress:melapress_file_monitor:1.9.0
-
cpe:2.3:a:melapress:melapress_file_monitor:2.0.0
-
cpe:2.3:a:melapress:melapress_file_monitor:2.0.1
-
cpe:2.3:a:melapress:melapress_file_monitor:2.0.2
-
cpe:2.3:a:melapress:melapress_file_monitor:2.1.0