{"uuid": "d83bdcb8-df0b-4593-82d6-19d67e39f21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3395", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3395\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.\n\ud83d\udccf Published: 2022-10-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T20:07:02.496Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0", "creation_timestamp": "2025-05-07T20:23:01.000000Z"}