WordPress Plugin Vulnerabilities
Events Made Easy <= 2.3.14 - Subscriber+ SQLi
Description
The plugin does not properly sanitise and escape the search_name parameter before using it in a SQL statement via the eme_recurrences_list AJAX action, leading to a SQL injection exploitable by any authenticated users, such as subscriber
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Joshua Martinelle (Tenable Research)
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-03-22 (about 3 years ago)
Added
2023-03-23 (about 3 years ago)
Last Updated
2023-03-23 (about 3 years ago)