The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 | exploit vdb entry third party advisory technical description |
https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35/ |