During the security analysis, ThunderScan discovered SQL injection vulnerabilities in AccessPress Social Icons WordPress plugin. The easiest way to reproduce the vulnerability is to visit the provided URL while being logged in as administrator or another user that is authorized to access the plugin settings page. Any user with such privileges can obtain the valid _wpnonce value by previously visiting the settings page. Users that do not have full administrative privileges could abuse the database access the vulnerability provides to either escalate their privileges or obtain and modify database contents they were not supposed to be able to.
http://example.com/wp-admin/admin-post.php?action=aps_copy_action&si_id=1%20AND%20SLEEP(5)&_wpnonce=8945828dex
INJECTION
Neven Biruski
ethicalhack3r
No
2017-04-19 (about 5 years ago)
2017-04-20 (about 5 years ago)
2020-08-24 (about 2 years ago)