
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-0827 affects the Bestbooks WordPress plugin through version 2.6.3. The vulnerability was discovered and publicly disclosed on May 17, 2022, with the last update to the advisory on May 18, 2022. This security issue impacts WordPress installations running the affected versions of the Bestbooks plugin (WPScan).
The vulnerability is classified as an SQL Injection (SQLi) with a CVSS score of 8.6 (High). The issue stems from the plugin's failure to properly sanitize and escape certain parameters before using them in SQL statements via an AJAX action. Specifically, the 'credit' and 'debit' parameters in the 'bestbooksaddtransaction' AJAX action are vulnerable to manipulation (WPScan).
This vulnerability allows unauthenticated users to perform SQL injection attacks against affected WordPress installations. The high CVSS score of 8.6 indicates that successful exploitation could lead to significant security implications, including unauthorized access to or manipulation of the database (WPScan).
As of the last update, there is no known fix available for this vulnerability. Users running affected versions of the Bestbooks plugin should consider disabling it until a security patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."