vendor:
WP e-Commerce plugin
by:
Miroslav Stampar
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WP e-Commerce plugin
Affected Version From: 3.8.2006
Affected Version To: 3.8.2006
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:wordpress_wp_e-commerce_plugin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
WordPress WP e-Commerce plugin <= 3.8.6 SQL Injection Vulnerability
The WordPress WP e-Commerce plugin version 3.8.6 is vulnerable to a SQL injection attack. The vulnerability exists in the chronopay.php file, which contains a callback function that is vulnerable to a SQL injection attack. The attack is possible due to the lack of input validation on the 'cs1' parameter, which is passed to the SQL query. An attacker can exploit this vulnerability by sending a specially crafted POST request with malicious SQL code in the 'cs1' parameter.
Mitigation:
Input validation should be performed on all user-supplied data before passing it to the SQL query. Additionally, the 'chronopay_salt' option should be set to a random value.