First published: Fri Jul 11 2014(Updated: )
SQL injection vulnerability in the WP Rss Poster (wp-rss-poster) plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter in the wrp-add-new page to wp-admin/admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WP RSS Poster | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4938 has a medium severity rating due to the potential for remote SQL injection attacks.
To fix CVE-2014-4938, update the WP Rss Poster plugin to a newer, patched version.
The potential impacts of CVE-2014-4938 include unauthorized access to the database and execution of arbitrary SQL commands.
CVE-2014-4938 affects users of the WP Rss Poster plugin version 1.0.0 on WordPress.
Yes, CVE-2014-4938 can be exploited remotely, allowing attackers to execute SQL commands from an external location.