CVE-2017-6576

A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/campaign-delete.php with the GET Parameter: id.
References
Link Resource
http://www.securityfocus.com/bid/96783 Third Party Advisory VDB Entry
https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin Exploit Third Party Advisory
http://www.securityfocus.com/bid/96783 Third Party Advisory VDB Entry
https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96783 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/96783 - Third Party Advisory, VDB Entry
References () https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin - Exploit, Third Party Advisory () https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin - Exploit, Third Party Advisory

Information

Published : 2017-03-09 09:59

Updated : 2025-04-20 01:37


NVD link : CVE-2017-6576

Mitre link : CVE-2017-6576

CVE.ORG link : CVE-2017-6576


JSON object : View

Products Affected

mail-masta_project

  • mail-masta
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')