Wallos before 1.15.3 is vulnerable to SQL Injection via the category and payment parameters to /subscriptions/get.php.
References
| Link | Resource |
|---|---|
| https://github.com/ellite/Wallos | Product |
| https://github.com/ellite/Wallos/releases/tag/v1.15.3 | Release Notes |
| https://injasec.com/open-source-software-oss/cve-2024-29320-sql-injection-in-wallos/ | Exploit Third Party Advisory |
| https://github.com/ellite/Wallos | Product |
| https://github.com/ellite/Wallos/releases/tag/v1.15.3 | Release Notes |
| https://injasec.com/open-source-software-oss/cve-2024-29320-sql-injection-in-wallos/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-30 16:15
Updated : 2025-06-03 15:00
NVD link : CVE-2024-29320
Mitre link : CVE-2024-29320
CVE.ORG link : CVE-2024-29320
JSON object : View
Products Affected
wallosapp
- wallos
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
