The Nirweb support WordPress plugin prior to 2.8.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
nirweb nirweb support |