Vulnerabilities protected by our SQL Injection firewall rule

1,758,561
Attacks Blocked in Past 24 Hours

Showing 281-300 of 1,444 Vulnerabilities

Title CVE ID CVSS Vector Date
Simply Schedule Appointments <= 1.6.5.27 - Authenticated(Administrator+) SQL Injection CVE-2023-50851 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
JS Help Desk <= 2.8.1 - Unauthenticated SQL Injection via email and trackingid CVE-2023-50839 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Pre* Party Resource Hints < 1.8.19 - Authenticated(Administrator+) SQL Injection CVE-2023-50855 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Login Lockdown – Protect Login Form <= 2.06 - Authenticated(Administrator+) SQL Injection CVE-2023-50837 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
MF Gig Calendar <=1.2.1 - Authenticated(Contributor+) SQL Injection CVE-2023-50842 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Automation By Autonami <= 2.6.1 - Authenticated(Administrator+) SQL Injection CVE-2023-50857 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Squirrly SEO - Advanced Pack <= 2.3.8 - Authenticated(Administrator+) SQL Injection CVE-2023-50854 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Clockwork SMS Notfications <= 3.0.4 - Authenticated(Administrator+) SQL Injection CVE-2023-50843 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
E2Pdf <= 1.20.23 - Authenticated(Administrator+) SQL Injection CVE-2023-50849 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
404 Solution <= 2.34.0 - Authenticated(Administrator+) SQL Injection CVE-2023-50848 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Mail logging – WP Mail Catcher <= 2.1.3 - Authenticated(Administrator+) SQL Injection CVE-2023-50844 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.6 - Authenticated (Administrator+) SQL Injection CVE-2023-6620 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Welcart e-Commerce <= 2.9.3 - Authenticated(Editor+) SQL Injection CVE-2023-50847 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
GeoDirectory <= 2.3.28 - Authenticated(Administrator+) SQL Injection CVE-2023-50845 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Funnel Builder for WordPress by FunnelKit <= 2.14.3 - Authenticated(Administrator+) SQL Injection CVE-2023-50856 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
Advanced Form Integration <= 1.75.0 - Authenticated(Administrator+) SQL Injection CVE-2023-50853 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
BookIt <= 2.4.3 - Authenticated(Administrator+) SQL Injection CVE-2023-50852 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H December 21, 2023
BookingPress <= 1.0.72 - Authenticated (Contributor+) SQL Injection CVE-2023-50841 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H December 21, 2023
ArtPlacer Widget <= 2.20.6 - Authenticated (Editor+) SQL Injection CVE-2023-6373 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H December 7, 2023
Burst Statistics – Privacy-Friendly Analytics for WordPress 1.4.0 to 1.4.6.1 - Unauthenticated SQL Injection CVE-2023-5761 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 6, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation