The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users
[
{
"product": "SpeakOut! Email Petitions",
"vendor": "Unknown",
"versions": [
{
"lessThan": "2.14.15.1",
"status": "affected",
"version": "2.14.15.1",
"versionType": "custom"
}
]
}
]