Description
|
|
Miroslav Stampar has discovered a vulnerability in the WP Bannerize plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "item[]" parameter to wp-content/plugins/wp-bannerize/ajax_sorter.php (when the "X_REQUESTED_WITH" HTTP header is set) is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 2.8.7. Prior versions may also be affected.
|