Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.vapidlabs.com/advisory.php?v=197 | Exploit Patch Third Party Advisory | 
| https://wordpress.org/plugins/event-espresso-free/ | Product Third Party Advisory | 
| http://www.vapidlabs.com/advisory.php?v=197 | Exploit Patch Third Party Advisory | 
| https://wordpress.org/plugins/event-espresso-free/ | Product Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.vapidlabs.com/advisory.php?v=197 - Exploit, Patch, Third Party Advisory | |
| References | () https://wordpress.org/plugins/event-espresso-free/ - Product, Third Party Advisory | 
Information
                Published : 2017-09-14 13:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-1002026
Mitre link : CVE-2017-1002026
CVE.ORG link : CVE-2017-1002026
JSON object : View
Products Affected
                eventespresso
- event_espresso
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
