WordPress Plugin Vulnerabilities

Sirv <= 1.3.1 - Authenticated SQL Injection

Description

$_POST[ ‘id’ ] is not escaped. sirv_get_row_by_id() is accessible for every registered user.

$id = $_POST['row_id'];

$row = $wpdb->get_row("SELECT * FROM $table_name WHERE id = $id", ARRAY_A);

$row['images'] = unserialize($row['images']);

echo json_encode($row);

Proof of Concept

Affects Plugins

Fixed in 1.3.2

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Submitter
Lenon Leite
Submitter twitter
Verified
No

Timeline

Publicly Published
2016-11-10 (about 9 years ago)
Added
2016-11-21 (about 9 years ago)
Last Updated
2020-09-22 (about 5 years ago)

Other