Description
|
|
Two vulnerabilities have been reported in the LeagueManager plugin for WordPress, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.
1) Input passed via the "league_id" POST parameter to /wp-admin/admin.php (when "page" is set to "leaguemanager-export", "mode" is set to "teams", and "leaguemanager_export" is set to an arbitrary value) is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) The application does not sufficiently verify authorization when accessing the CSV export functionality. This can be exploited to e.g. disclose potentially sensitive information.
The vulnerabilities are reported in version 3.8. Prior versions may also be affected.
|