The Unlimited PopUps WordPress plugin up to and including 4.5.3 does not sanitise or escape the did GET parameter before using it in a SQL statement, available to users as low as editor, leading to an authenticated SQL Injection
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
unlimited popups project unlimited popups |