SQL injection vulnerability in the Store Locator plugin 2.3 through 3.11 for WordPress allows remote attackers to execute arbitrary SQL commands via the sl_custom_field parameter to sl-xml.php.
References
Link | Resource |
---|---|
https://g0blin.co.uk/cve-2014-8621/ | Exploit Issue Tracking Third Party Advisory |
https://wpvulndb.com/vulnerabilities/8241 | Issue Tracking Third Party Advisory VDB Entry |
https://g0blin.co.uk/cve-2014-8621/ | Exploit Issue Tracking Third Party Advisory |
https://wpvulndb.com/vulnerabilities/8241 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://g0blin.co.uk/cve-2014-8621/ - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8241 - Issue Tracking, Third Party Advisory, VDB Entry |
Information
Published : 2017-10-16 15:29
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8621
Mitre link : CVE-2014-8621
CVE.ORG link : CVE-2014-8621
JSON object : View
Products Affected
store_locator_project
- store_locator
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')