The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626 | third party advisory vdb entry exploit technical description |
https://bulletin.iese.de/post/letsrecover-woocommerce-abandoned-cart_1-1-0_1 | third party advisory broken link |
https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626/ |