First published: Thu Sep 26 2019(Updated: )
The sendpress plugin before 1.2 for WordPress has SQL Injection via the wp-admin/admin.php?page=sp-queue listid parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pressified SendPress | <1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2015-9448 is a SQL Injection vulnerability in the sendpress plugin before version 1.2 for WordPress.
The vulnerability CVE-2015-9448 works by allowing an attacker to execute malicious SQL queries through the sp-queue listid parameter in the wp-admin/admin.php?page=sp-queue page.
The severity rating of vulnerability CVE-2015-9448 is high with a severity value of 8.8.
To fix vulnerability CVE-2015-9448, update the sendpress plugin to version 1.2 or newer.
You can find more information about vulnerability CVE-2015-9448 on the following references: http://cinu.pl/research/wp-plugins/mail_8a2f7613577ea8e613ec274aeec14527.html, https://wordpress.org/plugins/sendpress/#developers, https://wpvulndb.com/vulnerabilities/8324