CVE-2022-0786

KiviCare < 2.3.9 - Unauthenticated SQLi

Basic Information

CVE State
PUBLISHED
Reserved Date
February 28, 2022
Published Date
June 13, 2022
Last Updated
August 02, 2024
Vendor
Iqonic Design
Product
KiviCare – Clinic & Patient Management System (EHR)
Description
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
Tags
wordpress nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
76.72% (Percentile: 98.88%) as of 2025-06-08

Exploit Status

Exploited in the Wild
Yes (2025-05-11 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-11 00:00:00 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel