CVE-2026-3222

HIGH
中文标题:
(暂无数据)
英文标题:
The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_i
CVSS分数: 7.5
发布时间: 2026-03-11 06:17:14
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX handler (registered for unauthenticated users via `wp_ajax_nopriv`) allows calling arbitrary class methods including `wpgmp_return_final_capability`, which passes the unsanitized `location_id` GET parameter directly to a database query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

CWE类型:
CWE-89
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS版本: 3.1
机密性
HIGH
完整性
NONE
可用性
NONE
时间信息
发布时间:
2026-03-11 06:17:14
修改时间:
2026-03-11 13:52:47
创建时间:
2026-03-12 06:00:03
更新时间:
2026-03-12 06:00:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-3222 2026-03-12 02:00:06 2026-03-11 22:00:03
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史