
Cloud Vulnerability DB
A community-led vulnerabilities database
The Cube Slider WordPress plugin through version 1.2 contains a SQL injection vulnerability identified as CVE-2022-1684. The vulnerability was discovered by Daniel Krohmer (Fraunhofer IESE, Germany) and Shi Chen (University of Kaiserslautern, Germany), and was publicly disclosed on May 9, 2022. The vulnerability affects the plugin's handling of the idslider parameter, which is not properly sanitized or escaped before being used in various SQL queries (WPScan).
The vulnerability is classified as a SQL Injection (CWE-89) that affects high-privileged users such as administrators. The CVSS score is rated as 2.7 LOW (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) according to NVD scoring. The vulnerability exists in the plugin's handling of the idslider parameter across multiple operations including edit, delete, and save functions (NVD, WPScan).
The vulnerability allows high-privileged users such as administrators to perform SQL injection attacks through the idslider parameter. While the impact is somewhat limited due to the high privileges required to exploit the vulnerability, it could potentially lead to unauthorized database manipulation (WPScan).
As of the vulnerability disclosure, there is no known fix available for this vulnerability. Users of the Cube Slider WordPress plugin should consider implementing additional security measures or using alternative plugins until a patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."