The WP Fastest Cache WordPress plugin before 0.9.5 does not escape user input in the set_urls_with_terms method before using it in a SQL statement, leading to an SQL injection exploitable by low privilege users such as subscriber
[
{
"vendor": "Unknown",
"product": "WP Fastest Cache",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThan": "0.9.5"
}
],
"defaultStatus": "unaffected",
"collectionURL": "https://wordpress.org/plugins"
}
]