Description
An SQL injection vulnerability has been identified in pre-2.3.1 Magento code. An unauthenticated user can execute arbitrary code through an SQL injection vulnerability, which causes sensitive data leakage.
To quickly protect your store from this vulnerability only, install patch PRODSECBUG-2198. To protect against this vulnerability and others, you must upgrade to Magento Commerce or Open Source 2.3.1 or 2.2.8.
Remediation
Upgrade to the latest version of Magento. Magento released version 2.3.1, along with patched versions for 2.2.x, 2.1.x, and 1.1.
References
Related Vulnerabilities
WordPress Plugin Good LMS-Learning Management System SQL Injection (2.1.4)
WordPress Plugin GigPress SQL Injection (2.3.28)
WordPress Plugin Form Vibes-Database Manager for Forms SQL Injection (1.4.10)
WordPress Plugin WordPress Photo Gallery by Gallery Bank SQL Injection (3.0.101)
WordPress Plugin WP-Filebase Download Manager 'base' Parameter SQL Injection (0.2.9)