
Cloud Vulnerability DB
A community-led vulnerabilities database
SQL injection vulnerability affects the Order Data Edit page of Welcart e-Commerce versions 2.7 to 2.8.21. The vulnerability was discovered and disclosed on September 20, 2023, impacting WordPress installations using the affected Welcart e-Commerce plugin. The vulnerability allows users with editor privileges (without setting authority) or higher to perform unintended database operations (JVN Advisory).
The vulnerability is classified as SQL Injection (CWE-89) with a CVSS v3.1 Base Score of 8.8 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability specifically exists in the Order Data Edit page functionality and requires editor-level privileges or higher to exploit (NVD).
When exploited, this vulnerability allows authenticated users with editor privileges or higher to perform unauthorized database operations. This could potentially lead to unauthorized access to sensitive information and manipulation of database content (JVN Advisory).
The vulnerability has been patched in Welcart e-Commerce version 2.8.22. Users are strongly advised to update their installations to this version. The update is available through the standard WordPress plugin update mechanism (Welcart Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."