CVE-2017-6571

A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/view-campaign.php with the GET Parameter: id.
References
Link Resource
http://www.securityfocus.com/bid/96783 Third Party Advisory VDB Entry
https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin Exploit Third Party Advisory
http://www.securityfocus.com/bid/96783 Third Party Advisory VDB Entry
https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96783 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96783 - Third Party Advisory, VDB Entry
References () https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin - Exploit, Third Party Advisory () https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin - Exploit, Third Party Advisory

Information

Published : 2017-03-09 09:59

Updated : 2025-04-20 01:37


NVD link : CVE-2017-6571

Mitre link : CVE-2017-6571

CVE.ORG link : CVE-2017-6571


JSON object : View

Products Affected

mail-masta_project

  • mail-masta
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')