{"containers":{"cna":{"affected":[{"product":"Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection","vendor":"Unknown","versions":[{"lessThan":"6.930","status":"affected","version":"6.930","versionType":"custom"}]}],"credits":[{"lang":"en","value":"cydave"}],"descriptions":[{"lang":"en","value":"The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-11T14:40:59.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb"}],"source":{"discovery":"EXTERNAL"},"title":"WP Block and Stop Bad Bots < 6.930 - Unauthenticated SQLi","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-0949","STATE":"PUBLIC","TITLE":"WP Block and Stop Bad Bots < 6.930 - Unauthenticated SQLi"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection","version":{"version_data":[{"version_affected":"<","version_name":"6.930","version_value":"6.930"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"cydave"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb","refsource":"MISC","url":"https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:42.892Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-0949","datePublished":"2022-04-11T14:40:59.000Z","dateReserved":"2022-03-14T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:42.892Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}