Описание
Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database.
Ссылки
- Release NotesThird Party Advisory
- ExploitThird Party AdvisoryURL Repurposed
- Release NotesThird Party Advisory
- ExploitThird Party AdvisoryURL Repurposed
Уязвимые конфигурации
Конфигурация 1Версия до 36.0 (включая)
cpe:2.3:a:wordpress_poll_project:wordpress_poll:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 73%
0.00775
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database.
EPSS
Процентиль: 73%
0.00775
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-89