SQL injection vulnerability in content-audit-schedule.php in the Content Audit plugin before 1.6.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the "Audited content types" option in the content-audit page to wp-admin/options-general.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Oct/8 - Exploit | |
References | () http://www.securityfocus.com/bid/70214 - | |
References | () https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes/ - Exploit | |
References | () https://wordpress.org/plugins/content-audit/changelog - |
Information
Published : 2014-10-06 14:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5389
Mitre link : CVE-2014-5389
CVE.ORG link : CVE-2014-5389
JSON object : View
Products Affected
content_audit_project
- content_audit
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')