The SupportCandy WordPress plugin prior to 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
supportcandy supportcandy |