The Adicon Server WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
[
{
"cpes": [
"cpe:2.3:a:erichamby:adicon_server:*:*:*:*:*:*:*:*"
],
"vendor": "erichamby",
"product": "adicon_server",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "1.2"
}
],
"defaultStatus": "unknown"
}
]