CVE-2022-0846
CRITICAL EXPLOITED NUCLEISpeakout! Email Petitions < 2.14.15.1 - SQL Injection
Title source: ruleDescription
The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users
Nuclei Templates (1)
SpeakOut Email Petitions < 2.14.15.1 - SQL Injection
CRITICALVERIFIEDby theamanrawat
Scores
CVSS v3
9.8
EPSS
0.7119
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-11-30
CWE
CWE-89
Status
published
Products (1)
speakout\!_email_petitions_project/speakout\!_email_petitions
< 2.14.15.1
Published
Mar 28, 2022
Tracked Since
Feb 18, 2026