The plugin allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Note: This affect the premium version of the plugin, however, both the premium and free plugins have the same slug.
Fixed in version 3.4.2✓
2021-03-16 (about 6 months ago)
2021-03-25 (about 6 months ago)
2021-03-28 (about 6 months ago)