CVE-2022-4357
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
02/01/2023
Last modified:
10/04/2025
Description
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:* | 1.1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_1
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626
- https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_1
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626
- https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626/



