
Cloud Vulnerability DB
A community-led vulnerabilities database
The SEMA API WordPress plugin (versions before 4.02) contains a security vulnerability identified as CVE-2022-0836. The vulnerability was discovered by researcher cydave and was publicly disclosed on April 13, 2022. This security issue affects the plugin's AJAX functionality, where improper parameter sanitization could lead to SQL injection attacks (WPScan Details).
The vulnerability is classified as an SQL Injection (SQLI) vulnerability, falling under the OWASP Top 10 category A1: Injection and CWE-89. It received a CVSS score of 8.6 (High), indicating its serious nature. The technical issue stems from inadequate sanitization and escaping of parameters before their use in SQL statements via an AJAX action (WPScan Details).
The vulnerability allows unauthenticated users to perform SQL injection attacks against the affected WordPress installations. This could potentially lead to unauthorized access to sensitive database information, including user credentials and other critical data stored in the WordPress database (CVE Details).
The vulnerability has been fixed in version 4.02 of the SEMA API plugin. Website administrators running affected versions should immediately upgrade to version 4.02 or later to protect their installations (WPScan Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."