{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2840","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","dateUpdated":"2024-08-03T00:52:59.448Z","dateReserved":"2022-08-16T00:00:00.000Z","datePublished":"2022-09-19T00:00:00.000Z"},"containers":{"cna":{"title":"Zephyr Project Manager < 3.2.5 - Multiple Unauthenticated SQLi","providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-10-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections"}],"affected":[{"vendor":"Unknown","product":"Zephyr Project Manager","versions":[{"version":"3.2.5","status":"affected","lessThan":"3.2.5","versionType":"custom"}]}],"references":[{"url":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c"},{"url":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html"}],"credits":[{"lang":"en","value":"Rizacan TUFAN"}],"problemTypes":[{"descriptions":[{"type":"CWE","description":"CWE-89 SQL Injection","cweId":"CWE-89","lang":"en"}]}],"x_generator":"WPScan CVE Generator","source":{"discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:52:59.448Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html","tags":["x_transferred"]}]}]}}