The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users
CPE | Name | Operator | Version |
---|---|---|---|
speakout\\!_email_petitions | lt | 2.14.15.1 |