Description
|
|
Two vulnerabilities have been discovered in the Cart66 Lite plugin for WordPress, which can be exploited by malicious users to bypass certain security restrictions and conduct SQL injection attacks.
1) Input passed via the "q" POST parameter to wp-admin/admin-ajax.php (when "action" is set to "promotionProductSearch") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) The plugin does not properly restrict access to the save settings functionality within the "Cart66Ajax::saveSettings()" function (wp-content/plugins/cart66-lite/models/Cart66Ajax.php), which can be exploited to manipulate otherwise restricted settings.
The vulnerabilities are confirmed in version 1.5.3. Prior versions may also be affected.
|