CVE-2023-0600
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to execute unauthorized SQL commands on the database of websites using the WP Visitor Statistics plugin, potentially exposing sensitive data. It can be exploited by anyone visiting the site, as no authentication is required to launch the attack.
Technical Description
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
May 15, 2023
almost 3 years ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
codepress
Product
visitor statistics
Related Vulnerabilities
This vulnerability allows an attacker to access sensitive information from the WP Visitor Statistics plugin, potentially exposing user data and site activity. It affects versions up to 6.9.4, so sites using this plugin without updates are at risk.
This vulnerability allows an attacker with a low-level user role, like a contributor, to inject malicious scripts into the website, potentially leading to unauthorized actions or data theft. It occurs because the plugin fails to properly check and clean up certain inputs, making it easier for attackers to exploit.
This vulnerability allows an attacker to access and manipulate the database of a WordPress site using the Osamaesh WP Visitor Statistics plugin, potentially exposing sensitive information or altering data. It can be exploited without needing to log in, making it particularly dangerous for any site using this plugin version 5.7 or earlier.
This vulnerability allows an attacker with an authenticated user account to manipulate the database by injecting malicious SQL code through a poorly handled parameter in the WP Visitor Statistics plugin. If exploited, this could lead to unauthorized access to sensitive data or even complete control over the database.
This vulnerability allows an attacker to add any IP address to the exclusion list of the WP Visitor Statistics plugin, potentially blocking legitimate traffic. It requires the attacker to be an authenticated user or to trick a logged-in user into executing the action, and it could also lead to malicious scripts being run in the admin area due to poor input handling.