WordPress Plugin Vulnerabilities
Events <= 2.3.4 - Authenticated SQL Injection
Description
Type user access: administrator user.
$_GET[‘edit_event’] is not escaped.
File / Code:
Path Request: /wp-content/plugins/wp-events/wp-events.php
Line : 450 – 468
if ( isset( $_GET['edit_event'] ) ) {
$event_edit_id = esc_attr( $_GET['edit_event'] );
}
...
$edit_event = $wpdb->get_row( "SELECT * FROM `{$wpdb->prefix}events` WHERE `id` = {$event_edit_id}" );
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)