The Secure Copy Content Protection and Content Locking WordPress plugin prior to 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ays-pro secure copy content protection and content locking |