First published: Wed May 27 2015(Updated: )
Multiple SQL injection vulnerabilities in admin/handlers.php in the GigPress plugin before 2.3.9 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) show_artist_id or (2) show_venue_id parameter in an add action in the gigpress.php page to wp-admin/admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tri Gigpress | <=2.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4066 has a high severity rating due to its potential for remote authenticated SQL injection attacks.
To fix CVE-2015-4066, update the GigPress plugin to version 2.3.9 or later.
CVE-2015-4066 affects GigPress plugin versions up to and including 2.3.8.
CVE-2015-4066 can be exploited by remote authenticated users with access to the admin panel.
The parameters involved are show_artist_id and show_venue_id in the add action on the gigpress.php page.