ID

VAR-202210-1724


CVE

CVE-2022-3302


TITLE

CleanTalk  of  WordPress  for  Spam protection, AntiSpam, FireWall  In  SQL  Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-019868

DESCRIPTION

The Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.185.1 does not validate ids before using them in a SQL statement, which could lead to SQL injection exploitable by high privilege users such as admin. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-3302 // JVNDB: JVNDB-2022-019868 // VULHUB: VHN-430918

AFFECTED PRODUCTS

vendor:cleantalkmodel:spam protection\, antispam\, firewallscope:ltversion:5.185.1

Trust: 1.0

vendor:cleantalkmodel:spam protection, antispam, firewallscope:eqversion:5.185.1

Trust: 0.8

vendor:cleantalkmodel:spam protection, antispam, firewallscope: - version: -

Trust: 0.8

vendor:cleantalkmodel:spam protection, antispam, firewallscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019868 // NVD: CVE-2022-3302

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-3302
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-3302
value: HIGH

Trust: 1.0

NVD: CVE-2022-3302
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202210-1718
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-3302
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-3302
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019868 // CNNVD: CNNVD-202210-1718 // NVD: CVE-2022-3302 // NVD: CVE-2022-3302

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.1

problemtype:SQL injection (CWE-89) [ others ]

Trust: 0.8

sources: VULHUB: VHN-430918 // JVNDB: JVNDB-2022-019868 // NVD: CVE-2022-3302

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-1718

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-202210-1718

PATCH

title:WordPress plugin Spam protection SQL Repair measures for injecting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=212096

Trust: 0.6

sources: CNNVD: CNNVD-202210-1718

EXTERNAL IDS

db:NVDid:CVE-2022-3302

Trust: 3.3

db:JVNDBid:JVNDB-2022-019868

Trust: 0.8

db:CNNVDid:CNNVD-202210-1718

Trust: 0.6

db:VULHUBid:VHN-430918

Trust: 0.1

sources: VULHUB: VHN-430918 // JVNDB: JVNDB-2022-019868 // CNNVD: CNNVD-202210-1718 // NVD: CVE-2022-3302

REFERENCES

url:https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-3302

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-3302/

Trust: 0.6

sources: VULHUB: VHN-430918 // JVNDB: JVNDB-2022-019868 // CNNVD: CNNVD-202210-1718 // NVD: CVE-2022-3302

SOURCES

db:VULHUBid:VHN-430918
db:JVNDBid:JVNDB-2022-019868
db:CNNVDid:CNNVD-202210-1718
db:NVDid:CVE-2022-3302

LAST UPDATE DATE

2025-05-10T23:28:44.592000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-430918date:2022-10-26T00:00:00
db:JVNDBid:JVNDB-2022-019868date:2023-10-27T08:15:00
db:CNNVDid:CNNVD-202210-1718date:2022-10-27T00:00:00
db:NVDid:CVE-2022-3302date:2025-05-09T19:15:55.567

SOURCES RELEASE DATE

db:VULHUBid:VHN-430918date:2022-10-25T00:00:00
db:JVNDBid:JVNDB-2022-019868date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202210-1718date:2022-10-25T00:00:00
db:NVDid:CVE-2022-3302date:2022-10-25T17:15:56.977