CVE-2022-40404: n/a in n/a
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.
AI Analysis
Technical Summary
CVE-2022-40404 is a high-severity SQL injection vulnerability identified in Wedding Planner v1.0, specifically exploitable via the 'id' parameter in the /admin/select.php endpoint. SQL injection (CWE-89) vulnerabilities allow attackers to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This vulnerability has a CVSS 3.1 base score of 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although the affected product is a niche or less widely known application (Wedding Planner v1.0), the vulnerability allows an authenticated user with some privileges to execute arbitrary SQL commands, potentially leading to data leakage, unauthorized data manipulation, or denial of service. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability was published on September 26, 2022, and is recognized by MITRE and CISA enrichment, indicating credible acknowledgment by authoritative sources.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Wedding Planner v1.0 application within their environment. If used, especially in administrative contexts, the SQL injection flaw could lead to significant data breaches involving sensitive customer or business data, undermining confidentiality and integrity. The high severity score reflects the potential for attackers to manipulate or exfiltrate data and disrupt service availability. This could result in regulatory non-compliance under GDPR due to unauthorized access or data leakage, leading to financial penalties and reputational damage. Additionally, if the application interfaces with other internal systems, the compromise could cascade, affecting broader IT infrastructure. The requirement for some level of privileges to exploit reduces the risk from external unauthenticated attackers but does not eliminate insider threat or compromise via stolen credentials. Given the lack of patches, organizations may face prolonged exposure if they continue using the vulnerable software.
Mitigation Recommendations
Organizations should immediately audit their environment to identify any deployments of Wedding Planner v1.0, especially those exposing the /admin/select.php endpoint. If found, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and strict access controls. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter. Enforce the principle of least privilege to minimize the number of users with administrative access. Where possible, replace or upgrade the application to a version without this vulnerability or switch to alternative software. In absence of vendor patches, consider code review and manual remediation of the vulnerable SQL query to use parameterized queries or prepared statements, eliminating direct injection points. Monitor logs for suspicious activity related to SQL injection attempts and conduct regular security assessments. Finally, ensure backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2022-40404: n/a in n/a
Description
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-40404 is a high-severity SQL injection vulnerability identified in Wedding Planner v1.0, specifically exploitable via the 'id' parameter in the /admin/select.php endpoint. SQL injection (CWE-89) vulnerabilities allow attackers to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This vulnerability has a CVSS 3.1 base score of 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although the affected product is a niche or less widely known application (Wedding Planner v1.0), the vulnerability allows an authenticated user with some privileges to execute arbitrary SQL commands, potentially leading to data leakage, unauthorized data manipulation, or denial of service. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability was published on September 26, 2022, and is recognized by MITRE and CISA enrichment, indicating credible acknowledgment by authoritative sources.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Wedding Planner v1.0 application within their environment. If used, especially in administrative contexts, the SQL injection flaw could lead to significant data breaches involving sensitive customer or business data, undermining confidentiality and integrity. The high severity score reflects the potential for attackers to manipulate or exfiltrate data and disrupt service availability. This could result in regulatory non-compliance under GDPR due to unauthorized access or data leakage, leading to financial penalties and reputational damage. Additionally, if the application interfaces with other internal systems, the compromise could cascade, affecting broader IT infrastructure. The requirement for some level of privileges to exploit reduces the risk from external unauthenticated attackers but does not eliminate insider threat or compromise via stolen credentials. Given the lack of patches, organizations may face prolonged exposure if they continue using the vulnerable software.
Mitigation Recommendations
Organizations should immediately audit their environment to identify any deployments of Wedding Planner v1.0, especially those exposing the /admin/select.php endpoint. If found, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and strict access controls. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter. Enforce the principle of least privilege to minimize the number of users with administrative access. Where possible, replace or upgrade the application to a version without this vulnerability or switch to alternative software. In absence of vendor patches, consider code review and manual remediation of the vulnerable SQL query to use parameterized queries or prepared statements, eliminating direct injection points. Monitor logs for suspicious activity related to SQL injection attempts and conduct regular security assessments. Finally, ensure backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e2109c4522896dcc6af5c
Added to database: 5/21/2025, 6:52:57 PM
Last enriched: 7/7/2025, 1:27:24 PM
Last updated: 2/7/2026, 3:33:13 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.