Multiple SQL injection vulnerabilities in includes/Function.php in the Easy2Map plugin before 1.2.5 for WordPress allow remote attackers to execute arbitrary SQL commands via the mapName parameter in an e2m_img_save_map_name action to wp-admin/admin-ajax.php and other unspecified vectors.
References
Configurations
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2015/Jul/18 - Exploit | |
References | () http://www.securityfocus.com/archive/1/535922/100/0/threaded - | |
References | () http://www.vapid.dhs.org/advisory.php?v=131 - Exploit | |
References | () https://plugins.trac.wordpress.org/changeset/1191455/easy2map - | |
References | () https://wordpress.org/plugins/easy2map/changelog/ - Patch | |
References | () https://www.exploit-db.com/exploits/37534/ - Exploit |
Information
Published : 2015-07-08 16:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4614
Mitre link : CVE-2015-4614
CVE.ORG link : CVE-2015-4614
JSON object : View
Products Affected
easy2map_project
- easy2map
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')