{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2014-125099","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-18T18:49:50.010Z","datePublished":"2023-04-20T05:31:03.692Z","dateUpdated":"2024-08-06T14:10:56.621Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T07:17:34.994Z"},"title":"I Recommend This Plugin dot-irecommendthis.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"I Recommend This Plugin","versions":[{"version":"3.7.0","status":"affected"},{"version":"3.7.1","status":"affected"},{"version":"3.7.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in I Recommend This Plugin up to 3.7.2 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality of the file dot-irecommendthis.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 3.7.3 is able to address this issue. The identifier of the patch is 058b3ef5c7577bf557557904a53ecc8599b13649. It is recommended to upgrade the affected component. The identifier VDB-226309 was assigned to this vulnerability."},{"lang":"de","value":"In I Recommend This Plugin bis 3.7.2 für WordPress wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei dot-irecommendthis.php. Mittels Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 3.7.3 vermag dieses Problem zu lösen. Der Patch wird als 058b3ef5c7577bf557557904a53ecc8599b13649 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2014-09-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-18T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-05-09T07:51:25.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.226309","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.226309","tags":["signature","permissions-required"]},{"url":"https://github.com/wp-plugins/i-recommend-this/commit/058b3ef5c7577bf557557904a53ecc8599b13649","tags":["patch"]},{"url":"https://github.com/wp-plugins/i-recommend-this/releases/tag/3.7.3","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:56.621Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.226309","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.226309","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/wp-plugins/i-recommend-this/commit/058b3ef5c7577bf557557904a53ecc8599b13649","tags":["patch","x_transferred"]},{"url":"https://github.com/wp-plugins/i-recommend-this/releases/tag/3.7.3","tags":["patch","x_transferred"]}]}]}}