
Cloud Vulnerability DB
A community-led vulnerabilities database
The Podcast Importer SecondLine WordPress plugin before version 1.3.8 contains a SQL injection vulnerability identified as CVE-2022-1023. The vulnerability exists because the plugin does not properly sanitize and escape imported data, potentially allowing SQL injection attacks through malicious podcast files. This vulnerability was discovered and reported by YICHENG LIU-ZTE CHENFENG lab and was publicly disclosed on March 21, 2022 (WPScan).
The vulnerability is classified as a SQL Injection (SQLI) vulnerability, falling under the OWASP Top 10 category A1: Injection and CWE-89. It received a CVSS score of 7.2 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD). The issue specifically occurs during the podcast import process where malicious data can be injected through podcast files.
If successfully exploited, this vulnerability could allow attackers to perform SQL injection attacks through malicious podcast files. This could potentially lead to unauthorized access to the database, data manipulation, and exposure of sensitive information stored in the WordPress database (WPScan).
The vulnerability has been patched in version 1.3.8 of the Podcast Importer SecondLine plugin. The fix includes properly escaping SQL queries and implementing security patches for data sanitization (WordPress Plugin Repository). Users are strongly advised to update to version 1.3.8 or later to protect against this vulnerability.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."