Description
|
|
g0blin has discovered a vulnerability in the Store Locator plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "sl_vars[num_initial_displayed]" GET parameter to wp-content/plugins/store-locator/sl-xml.php (when "mode" is set to "gen") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 3.33.1. Prior versions may also be affected.
|