{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T01:31:07.385","vulnerabilities":[{"cve":{"id":"CVE-2024-13230","sourceIdentifier":"security@wordfence.com","published":"2025-01-21T11:15:09.267","lastModified":"2025-06-05T13:57:06.297","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Social Share, Social Login and Social Comments Plugin – Super Socializer plugin for WordPress is vulnerable to Limited SQL Injection via the ‘SuperSocializerKey’ parameter in all versions up to, and including, 7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional values into the already existing query that can be used to extract user metadata from the database."},{"lang":"es","value":"El complemento Social Share, Social Login and Social Comments Plugin – Super Socializer para WordPress es vulnerable a una inyección SQL limitada a través del parámetro «SuperSocializerKey» en todas las versiones hasta la 7.14 y incluida, debido a un escape insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen valores adicionales a la consulta ya existente que se pueden usar para extraer metadatos del usuario de la base de datos."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:heateor:super_socializer:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"7.14.1","matchCriteriaId":"FCDE0536-6ACD-4854-AAA5-B239DDD35DBF"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/super-socializer/trunk/super_socializer.php#L291","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3225440/","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/4d7b2a7f-3c67-4df1-bb15-e7f4f0035953?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}