WordPress Plugin Vulnerabilities

Users Ultra <= 1.4.35 - SQL Injection

Description

The AJAX action ‘edit_photo_cate’, which is defined in the file ‘users-ultra/addons/photocategories/admin/admin.php’, allows for SQL Injection via the POST parameter ‘cate_id’. This parameter is used in a call to the WordPress function ‘$wpdb->get_results()’ without being sanitized. This action is available to any logged in user.

Affects Plugins

Fixed in 1.4.36

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-02-09 (about 11 years ago)
Added
2015-02-09 (about 11 years ago)
Last Updated
2019-10-21 (about 6 years ago)

Other