SQL injection vulnerability in the WPML plugin before 3.1.9 for WordPress allows remote attackers to execute arbitrary SQL commands via the lang parameter in the HTTP Referer header in a wp-link-ajax action to comments/feed.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://klikki.fi/adv/wpml.html - Exploit | |
| References | () http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html - Exploit | |
| References | () http://seclists.org/fulldisclosure/2015/Mar/71 - Exploit | |
| References | () http://wpml.org/2015/03/wpml-security-update-bug-and-fix/ - Vendor Advisory | |
| References | () http://www.osvdb.org/119541 - | |
| References | () http://www.securityfocus.com/archive/1/534862/100/0/threaded - | 
Information
                Published : 2015-03-17 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-2314
Mitre link : CVE-2015-2314
CVE.ORG link : CVE-2015-2314
JSON object : View
Products Affected
                wpml
- wpml
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
