First published: Thu Oct 02 2014(Updated: )
Multiple SQL injection vulnerabilities in the All In One WP Security & Firewall plugin before 3.8.3 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All In One WP Security & Firewall | <=3.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6242 is classified as a high severity vulnerability due to its potential to allow arbitrary SQL command execution.
To fix CVE-2014-6242, update the All In One WP Security & Firewall plugin to version 3.8.3 or later.
CVE-2014-6242 affects users of the All In One WP Security & Firewall plugin prior to version 3.8.3 on WordPress.
CVE-2014-6242 includes multiple SQL injection vulnerabilities that can be exploited through the orderby and order parameters.
No, CVE-2014-6242 requires that an attacker be an authenticated user to exploit the vulnerabilities.