The G Auto-Hyperlink WordPress plugin up to and including 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
g auto-hyperlink project g auto-hyperlink |