WordPress Plugin Vulnerabilities
Users Ultra <= 1.4.35 - SQL Injection
Description
The AJAX action ‘edit_photo_cate’, which is defined in the file ‘users-ultra/addons/photocategories/admin/admin.php’, allows for SQL Injection via the POST parameter ‘cate_id’. This parameter is used in a call to the WordPress function ‘$wpdb->get_results()’ without being sanitized. This action is available to any logged in user.
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
Miscellaneous
Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2015-02-09 (about 11 years ago)
Added
2015-02-09 (about 11 years ago)
Last Updated
2019-10-21 (about 6 years ago)