Description
|
|
Miroslav Stampar has discovered a vulnerability in Js-appointment Plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "cat" parameter in wp-content/plugins/js-appointment/searchdata.php (when "search_action" is set to "searchadv") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability has been confirmed in version 1.5. Prior versions may also be affected.
|