Freshmail for WordPress <= 1.5.8 - shortcode.php SQL InjectionSign up to our free email alerts service for instant vulnerability notifications!
There is a SQL Injection vulnerability available for collaborators (or higher privileged users) for webs with freshmail plugin installed. The SQL Injection is located in the attribute "id" of the inserted shortcode [FM_form id="N"]. The shortcode attribute "id" is not sanitized before inserting it in a SQL query. A collaborator can insert shortcodes when he/she is editing a new post or page and can preview the results (no administrator approval needed), launching this SQL Injection.
|Proof of Concept||
fixed in version 1.6
|OWASP Top 10||A1: Injection|
|Publicly Published||2015-05-06 (almost 3 years ago)|
|Added||2015-05-08 (almost 3 years ago)|
|Last Updated||2015-05-15 (almost 3 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|