CVE-2022-0846

CRITICAL EXPLOITED NUCLEI

Speakout! Email Petitions < 2.14.15.1 - SQL Injection

Title source: rule

Description

The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users

Nuclei Templates (1)

SpeakOut Email Petitions < 2.14.15.1 - SQL Injection
CRITICALVERIFIEDby theamanrawat

Scores

CVSS v3 9.8
EPSS 0.7119
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-11-30
CWE
CWE-89
Status published
Products (1)
speakout\!_email_petitions_project/speakout\!_email_petitions < 2.14.15.1
Published Mar 28, 2022
Tracked Since Feb 18, 2026