The Orders functionality in the WordPress Page Contact plugin up to and including 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wpagecontact project wpagecontact |