
Cloud Vulnerability DB
A community-led vulnerabilities database
The Sync WooCommerce Product feed to Google Shopping WordPress plugin through version 1.2.4 contains a SQL injection vulnerability. The vulnerability exists in the admin dashboard where the 'feed_id' POST parameter is not properly sanitized before being used in SQL statements (WPScan).
The vulnerability is classified as a SQL Injection (SQLI) vulnerability with a CVSS score of 6.8 (Medium). It falls under the OWASP Top 10 category A1: Injection and is identified as CWE-89. The issue stems from improper sanitization of the 'feed_id' POST parameter when used in SQL statements within the admin dashboard (WPScan).
When exploited, this vulnerability allows authenticated users with administrative access to perform SQL injection attacks through the admin dashboard. This could potentially lead to unauthorized access to or manipulation of the database (WPScan).
As of the vulnerability disclosure, there is no known fix available for this issue. Users of the affected plugin should consider implementing additional security measures or using alternative solutions (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."