This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Templateinvaders First view 2022-02-28
Product Ti Woocommerce Wishlist Last view 2024-10-10
Version * Type Application
Update *  
Edition *  
Language *  
Sofware Edition pro  
Target Software wordpress  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2024-10-10 CVE-2024-9156

The TI WooCommerce Wishlist WordPress plugin through 2.8.2 is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

9.8 2024-08-29 CVE-2024-43917

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.

8.1 2023-06-07 CVE-2020-36725

The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the 'ti-woocommerce-wishlist/includes/export.class.php' file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings.

9.8 2022-02-28 CVE-2022-0412

The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks

CWE : Common Weakness Enumeration

%idName
100% (3) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...