
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-1014 affects the WP Contacts Manager WordPress plugin through version 2.2.4. The vulnerability was discovered and publicly disclosed on May 2, 2022. This security flaw exists in the plugin's handling of user-supplied POST data, which fails to implement proper sanitization before being used in SQL statements (WPScan, MITRE CVE).
The vulnerability is classified as an SQL Injection (SQLI) vulnerability, falling under the OWASP Top 10 category A1: Injection and CWE-89. It has been assigned a critical CVSS score of 9.4, indicating its severe nature. The technical issue stems from inadequate sanitization of POST data that is subsequently interpolated into SQL statements. The vulnerability can be exploited through the WordPress admin-ajax.php endpoint with specific parameters (WPScan).
The SQL injection vulnerability allows attackers to execute arbitrary SQL queries against the WordPress database. This can potentially lead to unauthorized access to sensitive information, including user credentials, and could result in complete database compromise. The unauthenticated nature of the vulnerability makes it particularly severe as it can be exploited without requiring any prior authentication (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue. Users of the WP Contacts Manager plugin should consider disabling or removing the plugin until a security patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."