In the Orange Form WordPress plugin up to and including 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow malicious users to make a logged in admin delete arbitrary posts for example
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
orange-form project orange-form |