Skip to main content

CVE-2022-40404: n/a in n/a

High
VulnerabilityCVE-2022-40404cvecve-2022-40404
Published: Mon Sep 26 2022 (09/26/2022, 13:00:06 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.

AI-Powered Analysis

AILast updated: 07/07/2025, 13:27:24 UTC

Technical Analysis

CVE-2022-40404 is a high-severity SQL injection vulnerability identified in Wedding Planner v1.0, specifically exploitable via the 'id' parameter in the /admin/select.php endpoint. SQL injection (CWE-89) vulnerabilities allow attackers to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This vulnerability has a CVSS 3.1 base score of 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although the affected product is a niche or less widely known application (Wedding Planner v1.0), the vulnerability allows an authenticated user with some privileges to execute arbitrary SQL commands, potentially leading to data leakage, unauthorized data manipulation, or denial of service. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability was published on September 26, 2022, and is recognized by MITRE and CISA enrichment, indicating credible acknowledgment by authoritative sources.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the usage of the Wedding Planner v1.0 application within their environment. If used, especially in administrative contexts, the SQL injection flaw could lead to significant data breaches involving sensitive customer or business data, undermining confidentiality and integrity. The high severity score reflects the potential for attackers to manipulate or exfiltrate data and disrupt service availability. This could result in regulatory non-compliance under GDPR due to unauthorized access or data leakage, leading to financial penalties and reputational damage. Additionally, if the application interfaces with other internal systems, the compromise could cascade, affecting broader IT infrastructure. The requirement for some level of privileges to exploit reduces the risk from external unauthenticated attackers but does not eliminate insider threat or compromise via stolen credentials. Given the lack of patches, organizations may face prolonged exposure if they continue using the vulnerable software.

Mitigation Recommendations

Organizations should immediately audit their environment to identify any deployments of Wedding Planner v1.0, especially those exposing the /admin/select.php endpoint. If found, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and strict access controls. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter. Enforce the principle of least privilege to minimize the number of users with administrative access. Where possible, replace or upgrade the application to a version without this vulnerability or switch to alternative software. In absence of vendor patches, consider code review and manual remediation of the vulnerable SQL query to use parameterized queries or prepared statements, eliminating direct injection points. Monitor logs for suspicious activity related to SQL injection attempts and conduct regular security assessments. Finally, ensure backups are current and tested to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e2109c4522896dcc6af5c

Added to database: 5/21/2025, 6:52:57 PM

Last enriched: 7/7/2025, 1:27:24 PM

Last updated: 8/12/2025, 8:48:13 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats