WordPress Plugin Vulnerabilities
Quiz And Survey Master < 7.1.14 - Authenticated SQL injection via Rest API
Description
While confirming https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab, another SQLi issue was identified and reported. The qsm_rest_get_bank_questions() function in the php/rest-api.php file did not property sanitise and escape the category parameter before using it in SQL statements passed to the get_row() and get_results() DB calls, allowing users with the edit_post capability (author+) to perform SQL injections.
Other SQLi issues were also identified by the WordPress plugin team
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
WPScanTeam
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-03-26 (about 4 years ago)
Added
2021-03-26 (about 4 years ago)
Last Updated
2021-03-26 (about 4 years ago)