{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5203","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-09-26T14:08:40.974Z","datePublished":"2023-12-26T18:33:07.808Z","dateUpdated":"2024-09-12T12:35:45.983Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-12-26T18:33:07.808Z"},"title":"WP Sessions Time Monitoring Full Automatic < 1.0.9 - Unauthenticated SQL injection","problemTypes":[{"descriptions":[{"description":"CWE-89 SQL Injection","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"WP Sessions Time Monitoring Full Automatic","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"1.0.9"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique."}],"references":[{"url":"https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Nicolas Surribas","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:52:07.793Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-01-02T16:20:08.552395Z","id":"CVE-2023-5203","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T12:35:45.983Z"}}]}}