WordPress Plugin Vulnerabilities

Cart66 Lite <= 1.5.3 - SQL Injection

Description

The QSA named ‘q’ for the ‘promotionProductSearch’ AJAX call is not being sanitized, which allows for MySQL injection utilizing a UNION. The user must be logged in for this to be applicable. The output is JSON encoded, however is a pure representation of the data returned from a MySQL query.

Affects Plugins

Fixed in 1.5.4

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-01-01 (about 11 years ago)
Added
2015-01-01 (about 11 years ago)
Last Updated
2019-10-21 (about 6 years ago)

Other