CVE-2023-54359 PUBLISHED

WordPress adivaha Travel Plugin 2.3 SQL Injection via pid

Assigner: VulnCheck
Reserved: 09.04.2026 Published: 09.04.2026 Updated: 09.04.2026

WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pid' GET parameter. Attackers can send requests to the /mobile-app/v3/ endpoint with crafted 'pid' values using XOR-based payloads to extract sensitive database information or cause denial of service.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.8

Product Status

Vendor Adivaha
Product WordPress adivaha Travel Plugin
Versions
  • Version 2.3 is affected

Credits

  • CraCkEr finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE