vendor:
Smart Manager
by:
Ivan Spiridonov - xbz0n
6.1
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Smart Manager
Affected Version From: 8.27.0
Affected Version To: 8.27.0
Patch Exists: NO
Related CWE: CVE-2024-0566
CPE: a:storeapps:smart_manager:8.27.0
Platforms Tested: Ubuntu 22.04
2024
Smart Manager 8.27.0 – Post-Authenticated SQL Injection
The Smart Manager plugin version 8.27.0 is vulnerable to a post-authenticated SQL injection due to improper sanitization of input parameters. Attackers with high privileges like administrators can exploit this issue by manipulating the 'sort_params%5BsortOrder%5D' and 'sort_params%5Bcolumn%5D' parameters in the admin AJAX endpoint (/wp-admin/admin-ajax.php). This allows attackers to inject malicious SQL commands, resulting in a time-based SQL injection vulnerability.
Mitigation:
To mitigate this vulnerability, the vendor should properly sanitize and escape user-supplied input before using it in SQL queries. Users are advised to update to a patched version of the Smart Manager plugin.