The plugin allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table;_id=1, on the ‘length’ HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Note: This affect the premium version of the plugin, however, both the premium and free plugins have the same slug.
CPE | Name | Operator | Version |
---|---|---|---|
wpdatatables | lt | 3.4.2 |