
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-4297 affects the WordPress plugin WP AutoComplete Search versions 1.0.4 and below. The vulnerability was discovered and publicly disclosed on December 12, 2022. This security issue is classified as an unauthenticated SQL injection vulnerability that allows attackers to execute arbitrary SQL commands through the plugin's AJAX functionality (WPScan).
The vulnerability stems from improper sanitization and escaping of a parameter in SQL statements that are accessible via AJAX to unauthenticated users. The vulnerability has been assigned a CVSS score of 8.6 (High) and is classified under OWASP Top 10 category A1: Injection and CWE-89. The issue specifically occurs in the AJAX functionality used for search results (WPScan).
As an unauthenticated SQL injection vulnerability, this security flaw could allow attackers to execute arbitrary SQL commands on the affected WordPress installation's database without requiring authentication. This could potentially lead to unauthorized access to sensitive data, manipulation of database contents, or other malicious database operations (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue. Website administrators running the affected versions of WP AutoComplete Search should consider either removing the plugin or implementing additional security controls to protect against SQL injection attacks (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."