SQL injection vulnerability in the Gallery Objects plugin 0.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the viewid parameter in a go_view_object action to wp-admin/admin-ajax.php.
References
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/127533/WordPress-Gallery-Objects-0.4-SQL-Injection.html - Exploit | |
References | () http://www.homelab.it/index.php/2014/07/18/wordpress-gallery-objects-0-4-sql-injection/#sthash.ftMVwBVK.dpbs - Exploit | |
References | () http://www.securityfocus.com/bid/68791 - Exploit |
Information
Published : 2014-08-12 20:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-5201
Mitre link : CVE-2014-5201
CVE.ORG link : CVE-2014-5201
JSON object : View
Products Affected
gallery_objects_project
- gallery_objects
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')