WordPress Plugin Vulnerabilities

Events <= 2.3.4 - Authenticated SQL Injection

Description

Type user access: administrator user.
$_GET[‘edit_event’] is not escaped.

File / Code:

Path Request: /wp-content/plugins/wp-events/wp-events.php

Line : 450 – 468

if ( isset( $_GET['edit_event'] ) ) {
$event_edit_id = esc_attr( $_GET['edit_event'] );
}

...
$edit_event = $wpdb->get_row( "SELECT * FROM `{$wpdb->prefix}events` WHERE `id` = {$event_edit_id}" );

Proof of Concept

Affects Plugins

No known fix

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)

Other