Multiple SQL injection vulnerabilities in includes/update.php in the Support Ticket System plugin before 1.2.1 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) id parameter.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/archive/1/536624/100/0/threaded | |
| https://wordpress.org/plugins/simple-support-ticket-system/#developers | Release Notes Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/8207 | Third Party Advisory | 
| http://www.securityfocus.com/archive/1/536624/100/0/threaded | |
| https://wordpress.org/plugins/simple-support-ticket-system/#developers | Release Notes Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/8207 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/archive/1/536624/100/0/threaded - | |
| References | () https://wordpress.org/plugins/simple-support-ticket-system/#developers - Release Notes, Third Party Advisory | |
| References | () https://wpvulndb.com/vulnerabilities/8207 - Third Party Advisory | 
Information
                Published : 2017-09-26 15:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-7670
Mitre link : CVE-2015-7670
CVE.ORG link : CVE-2015-7670
JSON object : View
Products Affected
                support_ticket_system_project
- support_ticket_system
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
