### [CVE-2017-14723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks. ### POC #### Reference - https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Afetter618/WordPress-PenTest - https://github.com/Byebyesky/IT-Security-Projekt - https://github.com/CeCe2018/Codepath - https://github.com/CeCe2018/Codepath-Week-7-Alternative-Assignment-Essay - https://github.com/Tanvi20/Week-7-Alternative-Assignment-wp-cve