The Events Made Easy WordPress plugin prior to 2.2.81 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
e-dynamics events made easy |