Custom Permalinks <= 1.1 - Authenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Missing checking of user controllable input during Bulk Action in the Custom Permalinks backend page leads to SQL injection vulnerability. 
Proof of Concept
Send authenticated POST request to "URL/wp-admin/admin.php?page=custom-permalinks-post-permalinks" with parameters "action=delete&permalinks[]=1) PAYLOAD -- "

Affects Plugin

fixed in version 1.2

References

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Karim El Ouerghemmi
Submitter Website https://ripstech.com
Views 307
Verified No
WPVDB ID 9029

Timeline

Publicly Published 2018-02-22 (5 months ago)
Added 2018-02-25 (5 months ago)
Last Updated 2018-02-25 (5 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.