vendor:
                    Smart Manager
                by:
                    Ivan Spiridonov - xbz0n
                6.1
                        CVSS
                    HIGH
                    SQL Injection
                    89
                        CWE
                    Product Name: Smart Manager
                    Affected Version From:  8.27.0
                    Affected Version To:  8.27.0
                    Patch Exists: NO
                    Related CWE: CVE-2024-0566
                    CPE:  a:storeapps:smart_manager:8.27.0
                    Platforms Tested:  Ubuntu 22.04
                    2024
                    Smart Manager 8.27.0 – Post-Authenticated SQL Injection
The Smart Manager plugin version 8.27.0 is vulnerable to a post-authenticated SQL injection due to improper sanitization of input parameters. Attackers with high privileges like administrators can exploit this issue by manipulating the 'sort_params%5BsortOrder%5D' and 'sort_params%5Bcolumn%5D' parameters in the admin AJAX endpoint (/wp-admin/admin-ajax.php). This allows attackers to inject malicious SQL commands, resulting in a time-based SQL injection vulnerability.
Mitigation:
					To mitigate this vulnerability, the vendor should properly sanitize and escape user-supplied input before using it in SQL queries. Users are advised to update to a patched version of the Smart Manager plugin.