Description
An id GET parameter of the Easy Testimonial Manager WordPress plugin through 1.2.0 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection
References
https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/
ExploitThird Party Advisory
https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3
ExploitThird Party Advisory
https://codevigilant.com/disclosure/2021/wp-plugin-easy-testimonial-manager/
ExploitThird Party Advisory
https://wpscan.com/vulnerability/e0bc9251-cccc-4416-91b2-8395d89d8fb3
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-09-06T09:15:08.017Z
4 years agoLast modified
2024-11-21T04:52:59.013Z
1 year ago