From bc7eb48cb4eafb08b240f2f18aa8b98cfaac57f4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 20 Feb 2023 15:26:40 +0530 Subject: [PATCH] added verified tag --- cves/2023/CVE-2023-23488.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2023/CVE-2023-23488.yaml b/cves/2023/CVE-2023-23488.yaml index cff9b1c9825..cc418b626b9 100644 --- a/cves/2023/CVE-2023-23488.yaml +++ b/cves/2023/CVE-2023-23488.yaml @@ -5,13 +5,13 @@ info: author: dwisiswant0 severity: critical description: | - The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected - by an unauthenticated SQL injection vulnerability in the 'code' parameter - of the '/pmpro/v1/order' REST route. + The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route. reference: - https://www.tenable.com/security/research/tra-2023-2 - https://wordpress.org/plugins/paid-memberships-pro/ - https://nvd.nist.gov/vuln/detail/CVE-2023-23488 + metadata: + verified: "true" tags: wp-plugin,wp,sqli,paid-memberships-pro,cve,cve2023,wordpress requests: