The ERP WordPress plugin prior to 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wedevs wp erp |