The NEX-Forms WordPress plugin before 8.4 does not properly escape the `table` parameter, which is populated with user input, before concatenating it to an SQL query.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d | third party advisory vdb entry exploit technical description |
https://github.com/SchmidAlex/nex-forms_SQL-Injection | third party advisory exploit |