{"vulnerability": "CVE-2022-0783", "sightings": [{"uuid": "d2bd8fab-97e0-48de-aaad-a1b086896475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0783", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2022/CVE-2022-0783.yaml", "content": "", "creation_timestamp": "2025-05-28T08:04:58.000000Z"}, {"uuid": "74903e79-61b1-4a34-b90a-fd02cb160c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0783", "type": "seen", "source": "https://t.me/cibsecurity/41734", "content": "\u203c CVE-2022-0783 \u203c\n\nThe Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-02T20:27:59.000000Z"}]}