The multimedial images WordPress plugin through 1.0b does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8 | exploit vdb entry third party advisory technical description |
https://bulletin.iese.de/post/multimedial-images_1-0b | third party advisory exploit |