WordPress Plugin Vulnerabilities

Simple Events Calendar <= 1.3.5 - Authenticated SQL Injection

Description

Type user access: administrator user.
$_POST[‘event_id’] is not escaped.

File / Code:

Path Request: /wp-content/plugins/simple-events-calendar/simple-events-calendar.php

Line : 467

$edit_event = $_POST['event_id'];
$update = $wpdb->get_results( " SELECT * FROM $table_name WHERE id = $edit_event ", "ARRAY_A" );

Proof of Concept

Affects Plugins

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)

Other