CVE-2022-0846

SpeakOut! Email Petitions < 2.14.15.1 - Unauthenticated SQLi

Basic Information

CVE State
PUBLISHED
Reserved Date
March 03, 2022
Published Date
March 28, 2022
Last Updated
August 02, 2024
Vendor
Unknown
Product
SpeakOut! Email Petitions
Description
The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users
Tags
wordpress nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
65.69% (Percentile: 98.37%) as of 2025-06-07

Exploit Status

Exploited in the Wild
Yes (2025-05-10 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-10 00:00:00 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel