WordPress Plugin Vulnerabilities
Handsome Testimonials & Reviews < 2.1.1 - Authenticated (Subscriber+) SQL Injection
Description
The hndtst_action_instance_callback AJAX call of the plugin, available to any authenticated users, does not sanitise, validate or escape the hndtst_previewShortcodeInstanceId POST parameter before using it in a SQL statement, leading to an SQL Injection issue.
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Shreya Pohekar of Codevigilant Project
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-06-29 (about 4 years ago)
Added
2021-06-29 (about 4 years ago)
Last Updated
2021-08-12 (about 4 years ago)