SQL Injection Warning – add to cart parameter
-
Hi all- SiteLock warned us today of a vulnerability for SQL injection. The “add to cart” GET parameter is not being sanitized. The scan gave only two URLs in question, and they are both for a product on our site with /?add-to-cart=15031 and /?add-to-cart=15033 added to the product slug.
I figured this would be a WooCommerce-side issue and wanted to reach out. From what I understand in reading other posts, WooCommerce already has a system in place that will not allow any strings of GET without a number in the string. However, any suggestions here? I’ve also sent in a support ticket to our main WooCommerce support with a full system report, but from what I read on the report, there’s nothing else amiss. All our plugins and such are up to date. I did just update WooCommerce recently and wanted to see if anyone else had received this warning since version 5.3.0.
- The topic ‘SQL Injection Warning – add to cart parameter’ is closed to new replies.