Users Ultra <= 1.4.35 - SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The AJAX action ‘edit_photo_cate’, which is defined in the file ‘users-ultra/addons/photocategories/admin/admin.php’, allows for SQL Injection via the POST parameter ‘cate_id’. This parameter is used in a call to the WordPress function ‘$wpdb->get_results()’ without being sanitized. This action is available to any logged in user.

Affects

Plugin users-ultra
fixed in version 1.4.36

References

URL https://research.g0blin.co.uk/g0blin-00030/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter James Hooker
Submitter Website https://research.g0blin.co.uk
Submitter Twitter g0blinResearch
Views 138
Verified No
WPVDB ID 7783

Timeline

Publicly Published 2015-02-09 (almost 2 years ago)
Added 2015-02-09 (almost 2 years ago)
Last Updated 2015-05-15 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.