Описание
The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.3 (включая)
cpe:2.3:a:nimble3:m-vslider:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 68%
0.00567
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role.
EPSS
Процентиль: 68%
0.00567
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89