CVE-2022-40404: n/a in n/a
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.
AI Analysis
Technical Summary
CVE-2022-40404 is a high-severity SQL injection vulnerability identified in Wedding Planner v1.0, specifically exploitable via the 'id' parameter in the /admin/select.php endpoint. SQL injection (CWE-89) vulnerabilities allow attackers to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This vulnerability has a CVSS 3.1 base score of 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although the affected product is a niche or less widely known application (Wedding Planner v1.0), the vulnerability allows an authenticated user with some privileges to execute arbitrary SQL commands, potentially leading to data leakage, unauthorized data manipulation, or denial of service. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability was published on September 26, 2022, and is recognized by MITRE and CISA enrichment, indicating credible acknowledgment by authoritative sources.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Wedding Planner v1.0 application within their environment. If used, especially in administrative contexts, the SQL injection flaw could lead to significant data breaches involving sensitive customer or business data, undermining confidentiality and integrity. The high severity score reflects the potential for attackers to manipulate or exfiltrate data and disrupt service availability. This could result in regulatory non-compliance under GDPR due to unauthorized access or data leakage, leading to financial penalties and reputational damage. Additionally, if the application interfaces with other internal systems, the compromise could cascade, affecting broader IT infrastructure. The requirement for some level of privileges to exploit reduces the risk from external unauthenticated attackers but does not eliminate insider threat or compromise via stolen credentials. Given the lack of patches, organizations may face prolonged exposure if they continue using the vulnerable software.
Mitigation Recommendations
Organizations should immediately audit their environment to identify any deployments of Wedding Planner v1.0, especially those exposing the /admin/select.php endpoint. If found, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and strict access controls. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter. Enforce the principle of least privilege to minimize the number of users with administrative access. Where possible, replace or upgrade the application to a version without this vulnerability or switch to alternative software. In absence of vendor patches, consider code review and manual remediation of the vulnerable SQL query to use parameterized queries or prepared statements, eliminating direct injection points. Monitor logs for suspicious activity related to SQL injection attempts and conduct regular security assessments. Finally, ensure backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2022-40404: n/a in n/a
Description
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-40404 is a high-severity SQL injection vulnerability identified in Wedding Planner v1.0, specifically exploitable via the 'id' parameter in the /admin/select.php endpoint. SQL injection (CWE-89) vulnerabilities allow attackers to manipulate backend SQL queries by injecting malicious input, potentially leading to unauthorized data access, data modification, or even full system compromise. This vulnerability has a CVSS 3.1 base score of 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although the affected product is a niche or less widely known application (Wedding Planner v1.0), the vulnerability allows an authenticated user with some privileges to execute arbitrary SQL commands, potentially leading to data leakage, unauthorized data manipulation, or denial of service. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability was published on September 26, 2022, and is recognized by MITRE and CISA enrichment, indicating credible acknowledgment by authoritative sources.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Wedding Planner v1.0 application within their environment. If used, especially in administrative contexts, the SQL injection flaw could lead to significant data breaches involving sensitive customer or business data, undermining confidentiality and integrity. The high severity score reflects the potential for attackers to manipulate or exfiltrate data and disrupt service availability. This could result in regulatory non-compliance under GDPR due to unauthorized access or data leakage, leading to financial penalties and reputational damage. Additionally, if the application interfaces with other internal systems, the compromise could cascade, affecting broader IT infrastructure. The requirement for some level of privileges to exploit reduces the risk from external unauthenticated attackers but does not eliminate insider threat or compromise via stolen credentials. Given the lack of patches, organizations may face prolonged exposure if they continue using the vulnerable software.
Mitigation Recommendations
Organizations should immediately audit their environment to identify any deployments of Wedding Planner v1.0, especially those exposing the /admin/select.php endpoint. If found, restrict access to the administrative interface to trusted networks and users only, employing network segmentation and strict access controls. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter. Enforce the principle of least privilege to minimize the number of users with administrative access. Where possible, replace or upgrade the application to a version without this vulnerability or switch to alternative software. In absence of vendor patches, consider code review and manual remediation of the vulnerable SQL query to use parameterized queries or prepared statements, eliminating direct injection points. Monitor logs for suspicious activity related to SQL injection attempts and conduct regular security assessments. Finally, ensure backups are current and tested to enable recovery in case of data corruption or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e2109c4522896dcc6af5c
Added to database: 5/21/2025, 6:52:57 PM
Last enriched: 7/7/2025, 1:27:24 PM
Last updated: 8/12/2025, 8:48:13 PM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.