WordPress Plugin Vulnerabilities
Mini Cart Plugin 1.00.1 - Authenticated SQL Injection
Description
$_REQUEST[item] is not escaped. Url is accessible for user collaborator above.
Url vulnerable : http://target/wp-admin/edit.php?page=mini-cart/item_form.php&item=0&action=edit
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2016-11-11 (about 9 years ago)
Added
2016-11-21 (about 9 years ago)
Last Updated
2019-11-01 (about 6 years ago)