{"containers":{"cna":{"affected":[{"product":"Advanced Booking Calendar","vendor":"Unknown","versions":[{"lessThan":"1.7.1","status":"affected","version":"1.7.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"YICHENG LIU-ZTE CHENFENG lab"}],"descriptions":[{"lang":"en","value":"The Advanced Booking Calendar WordPress plugin before 1.7.1 does not sanitise and escape the id parameter when editing Calendars, which could allow high privilege users such as admin to perform SQL injection attacks"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-11T14:41:04.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2695427"}],"source":{"discovery":"EXTERNAL"},"title":"Advanced Booking Calendar < 1.7.1 - Admin+ SQLi","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1006","STATE":"PUBLIC","TITLE":"Advanced Booking Calendar < 1.7.1 - Admin+ SQLi"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Advanced Booking Calendar","version":{"version_data":[{"version_affected":"<","version_name":"1.7.1","version_value":"1.7.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"YICHENG LIU-ZTE CHENFENG lab"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Advanced Booking Calendar WordPress plugin before 1.7.1 does not sanitise and escape the id parameter when editing Calendars, which could allow high privilege users such as admin to perform SQL injection attacks"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89 SQL Injection"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68","refsource":"MISC","url":"https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68"},{"name":"https://plugins.trac.wordpress.org/changeset/2695427","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2695427"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:42.797Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2695427"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1006","datePublished":"2022-04-11T14:41:04.000Z","dateReserved":"2022-03-17T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:42.797Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}