WordPress Plugin Vulnerabilities
wpDataTables < 3.4.2 - Blind SQL Injection via start Parameter
Description
The plugin allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
Note: This affect the premium version of the plugin, however, both the premium and free plugins have the same slug.
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Veno Eivazian, Massimiliano Ferraresi
Submitter
Veno Eivazian
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-03-16 (about 4 years ago)
Added
2021-03-25 (about 4 years ago)
Last Updated
2021-03-28 (about 4 years ago)