CVE-2022-0769

Users Ultra <= 3.1.0 - Unauthenticated SQL Injection

Basic Information

CVE State
PUBLISHED
Reserved Date
February 27, 2022
Published Date
April 25, 2022
Last Updated
August 02, 2024
Vendor
ExpressTech Systems
Product
Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin
Description
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
Tags
wordpress nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
77.00% (Percentile: 98.89%) as of 2025-06-14

Exploit Status

Exploited in the Wild
Yes (2025-05-22 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-23 18:00:22 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel