SQL injection vulnerability in the Landing Pages plugin 1.2.3, before 20131009, and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the "post" parameter to index.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/98334 - | |
References | () http://plugins.trac.wordpress.org/changeset?reponame=&old=785535%40landing-pages&new=785535%40landing-pages - Exploit, Patch | |
References | () http://secunia.com/advisories/55192 - Vendor Advisory | |
References | () http://wordpress.org/plugins/landing-pages/changelog - | |
References | () http://www.securityfocus.com/bid/62942 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/87803 - |
Information
Published : 2013-10-23 16:54
Updated : 2025-04-11 00:51
NVD link : CVE-2013-6243
Mitre link : CVE-2013-6243
CVE.ORG link : CVE-2013-6243
JSON object : View
Products Affected
landing_pages_project
- landing_pages_plugin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')