The plugin does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting
CPE | Name | Operator | Version |
---|---|---|---|
wp-user-frontend | lt | 3.5.26 |