Description
WordPress Plugin Export any WordPress data to XML/CSV is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Export any WordPress data to XML/CSV version 1.3.4 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.5 or latest
References
https://www.hackpertise.com/cve/37-cve-2022-1800/
https://sploitus.com/exploit?id=WPEX-ID:4267109C-0CA2-441D-889D-FB39C235F128
https://plugins.svn.wordpress.org/wp-all-export/trunk/readme.txt
Related Vulnerabilities
WebLogic CVE-2018-2625 Vulnerability (CVE-2018-2625)
WordPress Plugin Integration for Contact Form 7 and Pipedrive Cross-Site Scripting (1.0.9)
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.12)
Oracle Database Server CVE-2023-22096 Vulnerability (CVE-2023-22096)
ownCloud Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-6403)