vendor:
Ajax Category Dropdown WordPress Plugin
by:
High-Tech Bridge SA Security Research Lab
5.5
CVSS
MEDIUM
SQL Injection and XSS (Cross Site Scripting)
89 (SQL Injection) and 79 (XSS)
CWE
Product Name: Ajax Category Dropdown WordPress Plugin
Affected Version From: 2000.1.5
Affected Version To: 2000.1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:dyasonhat:ajax_category_dropdown_wordpress_plugin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Multiple SQL Injection and XSS in Ajax Category Dropdown WordPress Plugin
The vulnerability exists due to failure in the "/wp-content/plugins/ajax-category-dropdown/includes/dhat-ajax-cat-dropdown-request.php" script to properly sanitize user-supplied input. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. User can execute arbitrary JavaScript code in the browser of other users.
Mitigation:
Input validation and output encoding should be used to prevent SQL injection and XSS attacks.