The id GET parameter of one of the Video Embed WordPress plugin up to and including 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
video-embed-box project video-embed-box |