WordPress Plugin Vulnerabilities
Sirv <= 1.3.1 - Authenticated SQL Injection
Description
$_POST[ ‘id’ ] is not escaped. sirv_get_row_by_id() is accessible for every registered user.
$id = $_POST['row_id'];
$row = $wpdb->get_row("SELECT * FROM $table_name WHERE id = $id", ARRAY_A);
$row['images'] = unserialize($row['images']);
echo json_encode($row);
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Submitter
Lenon Leite
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2016-11-10 (about 9 years ago)
Added
2016-11-21 (about 9 years ago)
Last Updated
2020-09-22 (about 5 years ago)