WordPress Plugin Vulnerabilities

wpDataTables < 3.4.2 - Blind SQL Injection via length Parameter

Description

The plugin allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.

Note: This affect the premium version of the plugin, however, both the premium and free plugins have the same slug.

Affects Plugins

Fixed in 3.4.2

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Veno Eivazian, Massimiliano Ferraresi
Submitter
Veno Eivazian
Submitter website
Verified
No

Timeline

Publicly Published
2021-03-16 (about 4 years ago)
Added
2021-03-25 (about 4 years ago)
Last Updated
2021-03-28 (about 4 years ago)

Other