WordPress Plugin Vulnerabilities
Simple Events Calendar <= 1.3.5 - Authenticated SQL Injection
Description
Type user access: administrator user.
$_POST[‘event_id’] is not escaped.
File / Code:
Path Request: /wp-content/plugins/simple-events-calendar/simple-events-calendar.php
Line : 467
$edit_event = $_POST['event_id'];
$update = $wpdb->get_results( " SELECT * FROM $table_name WHERE id = $edit_event ", "ARRAY_A" );
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)