The Contact Form by WD WordPress plugin up to and including 1.13.23 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
web-dorado contact form maker |