CVE-2022-43462
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate the database of the IP Blacklist Cloud plugin, potentially gaining access to sensitive information or altering data. It affects versions up to 5.00 and requires the attacker to be authenticated, meaning they need to log in to exploit it.
Technical Description
Auth. SQL Injection (SQLi) vulnerability in Adeel Ahmed's IP Blacklist Cloud plugin <= 5.00 versions.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 17, 2023
about 3 years ago
Last Modified
Feb 27, 2026
about 1 month ago
Vendor
ad33lx
Product
ip blacklist cloud
Related Vulnerabilities
This vulnerability allows an attacker to remotely access sensitive files on a server by manipulating a specific filename in the IP Blacklist Cloud Plugin for WordPress. To exploit this, the attacker needs to send a specially crafted request to the affected plugin, which could lead to unauthorized access to the server's file system.
This vulnerability allows an attacker to inject malicious scripts into the IP Blacklist Cloud plugin, which can then be executed in the browsers of users who have access to the plugin. To exploit this, the attacker must have authenticated access to the plugin, meaning they need to log in as a legitimate user.